TITLE: phpMyAdmin "theme" and "db" Cross-Site Scripting Vulnerabilities
SECUNIA ADVISORY ID: SA20113
VERIFY ADVISORY: http://secunia.com/advisories/20113/
CRITICAL: Less critical
IMPACT: Cross Site Scripting
WHERE: >From remote
SOFTWARE: phpMyAdmin 2.x http://secunia.com/product/1720/
DESCRIPTION:
Two vulnerabilities have been reported in phpMyAdmin, which can be exploited by malicious people to conduct cross-site scripting attacks.
1) Input passed to the "theme" parameter isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerability has been reported in versions prior to 2.8.0.4 for the 2.8.0 branch.
2) Input passed to the "db" parameter isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerability has been reported in some versions prior to 2.8.0.4.
SOLUTION: Update to version 2.8.0.4.
http://www.phpmyadmin.net/home_page/downloads.php
PROVIDED AND/OR DISCOVERED BY:
1) Reported by the vendor.
2) The vendor credits Sven Vetsch/Disenchant.
ORIGINAL ADVISORY:
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-2
phpMyAdmin theme and db Cross-Site Scripting VulnerabilitiesPosted on Monday, May 15, 2006 @ 09:04:05 CDT in Security |