Lucene search

K
freebsdFreeBSDEF417DA3-1640-11E2-999B-E0CB4E266481
HistoryOct 08, 2012 - 12:00 a.m.

phpMyAdmin -- Multiple XSS due to unescaped HTML output in Trigger, Procedure and Event pages and Fetching the version information from a non-SSL site is vulnerable to a MITM attack

2012-10-0800:00:00
vuxml.freebsd.org
16

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.001

Percentile

49.2%

The phpMyAdmin development team reports:

When creating/modifying a trigger, event or procedure
with a crafted name, it is possible to trigger an XSS.

To display information about the current phpMyAdmin
version on the main page, a piece of JavaScript is fetched
from the phpmyadmin.net website in non-SSL mode. A
man-in-the-middle could modify this script on the wire to
cause mischief.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchphpmyadmin= 3.5UNKNOWN
FreeBSDanynoarchphpmyadmin< 3.5.3UNKNOWN

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.001

Percentile

49.2%