Gentoo Logo

phpMyAdmin: Multiple XSS vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200411-36 / phpmyadmin
Release Date November 27, 2004
Latest Revision November 27, 2004: 01
Impact low
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
dev-db/phpmyadmin < 2.6.0_p3 >= 2.6.0_p3 All supported architectures

Related bugreports: #71819


phpMyAdmin is vulnerable to cross-site scripting attacks.

2.  Impact Information


phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL databases from a web-browser.


Cedric Cochin has discovered multiple cross-site scripting vulnerabilities in phpMyAdmin. These vulnerabilities can be exploited through the PmaAbsoluteUri parameter, the zero_rows parameter in read_dump.php, the confirm form, or an error message generated by the internal phpMyAdmin parser.


By sending a specially-crafted request, an attacker can inject and execute malicious script code, potentially compromising the victim's browser.

3.  Resolution Information


There is no known workaround at this time.


All phpMyAdmin users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.0_p3"

4.  References


Page updated November 27, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.