Gentoo Logo

phpMyAdmin: Multiple XSS vulnerabilities

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200411-36 / phpmyadmin
Release Date November 27, 2004
Latest Revision November 27, 2004: 01
Impact low
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
dev-db/phpmyadmin < 2.6.0_p3 >= 2.6.0_p3 All supported architectures

Related bugreports: #71819

Synopsis

phpMyAdmin is vulnerable to cross-site scripting attacks.

2.  Impact Information

Background

phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL databases from a web-browser.

Description

Cedric Cochin has discovered multiple cross-site scripting vulnerabilities in phpMyAdmin. These vulnerabilities can be exploited through the PmaAbsoluteUri parameter, the zero_rows parameter in read_dump.php, the confirm form, or an error message generated by the internal phpMyAdmin parser.

Impact

By sending a specially-crafted request, an attacker can inject and execute malicious script code, potentially compromising the victim's browser.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All phpMyAdmin users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.0_p3"

4.  References



Print

Page updated November 27, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.