CVE-2008-1567

5.5 MEDIUM
Published: March 31, 2008 Modified: April 23, 2026
View on NVD

Description

phpMyAdmin before 2.11.5.1 stores the MySQL (1) username and (2) password, and the (3) Blowfish secret key, in cleartext in a Session file under /tmp, which allows local users to obtain sensitive information.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/29588
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/29613
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/29964
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/30816
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/32834
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/33822
Source: cve@mitre.org
Broken Link Vendor Advisory
http://www.debian.org/security/2008/dsa-1557
Source: cve@mitre.org
Mailing List Patch
http://www.securityfocus.com/bid/28560
Source: cve@mitre.org
Broken Link Patch Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/1037/references
Source: cve@mitre.org
Broken Link Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/41541
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://secunia.com/advisories/29588
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/29613
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/29964
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/30816
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/32834
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/33822
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://sourceforge.net/tracker/index.php?func=detail&aid=1909711&group_id=23067&atid=377408
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
http://www.debian.org/security/2008/dsa-1557
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
http://www.mandriva.com/security/advisories?name=MDVSA-2008:131
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-2
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.securityfocus.com/bid/28560
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/1037/references
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/41541
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00031.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00080.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List

34 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.5 / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

fedoraproject debian opensuse phpmyadmin