PHP and myphpadmin vulnerabilities with NaigiosXi
Posted: Wed Jul 25, 2018 1:48 pm
We received an internal scan report of a vulnerability with our NagiosXi server. I need your guidance on how to mitigate the issues identified.
NagiosXi installed Version: 5.4.13
The servers is running Red Hat Enterprise Linux Server release 7.5 (Maipo)
The version of php installed is 5.4.16-45. Redhat reports that there will be no CVE fix issued for php-5.4, or php-5.5. There is a release of package rh-php56-2.3-1.el7.x86_64. I need to know if php-5.4 components can be removed and php-56 installed. If yes, what should be the process ffollowed. If not, what is our course of action?
Installed Packages
sudo rpm -qa |grep php
php-common-5.4.16-45.el7.x86_64
php-process-5.4.16-45.el7.x86_64
php-5.4.16-45.el7.x86_64
php-mbstring-5.4.16-45.el7.x86_64
php-mssql-5.4.16-4.el7.x86_64
php-pear-HTML-Template-IT-1.3.0-2.el5.noarch
php-cli-5.4.16-45.el7.x86_64
php-ldap-5.4.16-45.el7.x86_64
php-snmp-5.4.16-45.el7.x86_64
php-pecl-ssh2-0.12-1.el7.x86_64
php-pdo-5.4.16-45.el7.x86_64
php-mysql-5.4.16-45.el7.x86_64
php-gd-5.4.16-45.el7.x86_64
php-pear-1.9.4-21.el7.noarch
php-pgsql-5.4.16-45.el7.x86_64
php-mcrypt-5.4.16-4.el7.x86_64
php-xml-5.4.16-45.el7.x86_64
I see this file reference for phpmyadmin. I am not familiar how phpmyadmin is used with Nagios. Can it be disabled and what would be the affect?
/usr/share/nmap/scripts/http-phpmyadmin-dir-traversal.nse
Here is the text for the vulnerability:
PHP has been reported to be vulnerable to the following issues:
- An error exist with the virtual_file_ex function. Specifically, the function defines the "path_length" variable as a signed integer and is not checked for negative values. (CVE-2016-6289,)
- An Integer overflow in the php_stream_zip_opener function in ext/zip/zip_stream.c. The error occurs with how the "php_stream_zip_opener" function fails to check the path_len variable value when PHP handles a zip stream. (CVE-2016-6297)
- PhpMyAdmin is prone to cross-site scripting vulnerability because certain input passed to the database search script is not properly sanitized before being returned to the user.
PhpMyAdmin is prone to the following vulnerabilities:
- phpMyAdmin fails to validate BBcode tags in user input of error.php (CVE-2010-4480)
- Unauthenticated user is able to display phpinfo output if phpMyAdmin was enabled to show it. (CVE-2010-4481
NagiosXi installed Version: 5.4.13
The servers is running Red Hat Enterprise Linux Server release 7.5 (Maipo)
The version of php installed is 5.4.16-45. Redhat reports that there will be no CVE fix issued for php-5.4, or php-5.5. There is a release of package rh-php56-2.3-1.el7.x86_64. I need to know if php-5.4 components can be removed and php-56 installed. If yes, what should be the process ffollowed. If not, what is our course of action?
Installed Packages
sudo rpm -qa |grep php
php-common-5.4.16-45.el7.x86_64
php-process-5.4.16-45.el7.x86_64
php-5.4.16-45.el7.x86_64
php-mbstring-5.4.16-45.el7.x86_64
php-mssql-5.4.16-4.el7.x86_64
php-pear-HTML-Template-IT-1.3.0-2.el5.noarch
php-cli-5.4.16-45.el7.x86_64
php-ldap-5.4.16-45.el7.x86_64
php-snmp-5.4.16-45.el7.x86_64
php-pecl-ssh2-0.12-1.el7.x86_64
php-pdo-5.4.16-45.el7.x86_64
php-mysql-5.4.16-45.el7.x86_64
php-gd-5.4.16-45.el7.x86_64
php-pear-1.9.4-21.el7.noarch
php-pgsql-5.4.16-45.el7.x86_64
php-mcrypt-5.4.16-4.el7.x86_64
php-xml-5.4.16-45.el7.x86_64
I see this file reference for phpmyadmin. I am not familiar how phpmyadmin is used with Nagios. Can it be disabled and what would be the affect?
/usr/share/nmap/scripts/http-phpmyadmin-dir-traversal.nse
Here is the text for the vulnerability:
PHP has been reported to be vulnerable to the following issues:
- An error exist with the virtual_file_ex function. Specifically, the function defines the "path_length" variable as a signed integer and is not checked for negative values. (CVE-2016-6289,)
- An Integer overflow in the php_stream_zip_opener function in ext/zip/zip_stream.c. The error occurs with how the "php_stream_zip_opener" function fails to check the path_len variable value when PHP handles a zip stream. (CVE-2016-6297)
- PhpMyAdmin is prone to cross-site scripting vulnerability because certain input passed to the database search script is not properly sanitized before being returned to the user.
PhpMyAdmin is prone to the following vulnerabilities:
- phpMyAdmin fails to validate BBcode tags in user input of error.php (CVE-2010-4480)
- Unauthenticated user is able to display phpinfo output if phpMyAdmin was enabled to show it. (CVE-2010-4481