Solved

Cybersecurity Vulnerability


Badge +7

Hello,

 

The security department send us this report where appears to be some vulnerabilities from Commvault, do you know if there is some fixes regarding this? Thank you.

Regards,

 

Jmiamaral

 

icon

Best answer by Onno van den Berg 8 July 2022, 12:54

View original

6 replies

Userlevel 7
Badge +23

Thanks for the post, @jmiamaral !

I looked into the 3 mentioned here and do not see them in our incident database or docs at all.  Note that these are all 10+ years old, though I don’t see them referenced in our databases at all.

CVE-2011-2505

 

Libraries/auth/swekey/swekey.auth.lib.php in the Swekey authentication feature in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 assigns values to arbitrary parameters referenced in the query string, which allows remote attackers to modify the SESSION superglobal array via a crafted request, related to a "remote variable manipulation vulnerability."

CVE-2011-2506

setup/lib/ConfigGenerator.class.php in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 does not properly restrict the presence of comment closing delimiters, which allows remote attackers to conduct static code injection attacks by leveraging the ability to modify the SESSION superglobal array.

CVE-2010-3065

The default session serializer in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 does not properly handle the PS_UNDEF_MARKER marker, which allows context-dependent attackers to modify arbitrary session variables via a crafted session variable name.

 

Userlevel 7
Badge +19

@jmiamaral which version (feature release and maintenance release) are you running right now?

Badge +7

@Mike Struening  so you think this is not an issue at all, since they are all  +10 years old?

 

@Onno van den Berg im on 24.43

Userlevel 7
Badge +19

Ok, so a pretty recent version! Great! So only thing I can think off is that you are hitting something similar as posted here: 

So based on this info, which I can’t verify atm, Commvault is not using php anymore. Does the output of the scan point to the particular files who are vulnerable/exploitable on the file system? 

Userlevel 7
Badge +19

@jmiamaral any update?

Badge +7

@Onno van den Berg hey, since Commvault doesn’t use PHP anymore we discarded this as a threat. Thank you.

Reply