Ravens PHP Scripts

phpMyAdmin theme and db Cross-Site Scripting Vulnerabilities
Date: Monday, May 15, 2006 @ 09:04:05 CDT
Topic: Security


TITLE: phpMyAdmin "theme" and "db" Cross-Site Scripting Vulnerabilities

SECUNIA ADVISORY ID: SA20113

VERIFY ADVISORY: http://secunia.com/advisories/20113/

CRITICAL: Less critical

IMPACT: Cross Site Scripting

WHERE: >From remote

SOFTWARE: phpMyAdmin 2.x http://secunia.com/product/1720/

DESCRIPTION:
Two vulnerabilities have been reported in phpMyAdmin, which can be exploited by malicious people to conduct cross-site scripting attacks.

1) Input passed to the "theme" parameter isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerability has been reported in versions prior to 2.8.0.4 for the 2.8.0 branch.

2) Input passed to the "db" parameter isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerability has been reported in some versions prior to 2.8.0.4.

SOLUTION: Update to version 2.8.0.4.
http://www.phpmyadmin.net/home_page/downloads.php

PROVIDED AND/OR DISCOVERED BY:
1) Reported by the vendor.
2) The vendor credits Sven Vetsch/Disenchant.

ORIGINAL ADVISORY:
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-2








This article comes from Ravens PHP Scripts
https://www.ravenphpscripts.com

The URL for this story is:
https://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2162