Lucene search

K
gentooGentoo FoundationGLSA-200504-08
HistoryApr 11, 2005 - 12:00 a.m.

phpMyAdmin: Cross-site scripting vulnerability

2005-04-1100:00:00
Gentoo Foundation
security.gentoo.org
16

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.006

Percentile

78.4%

Background

phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL databases from a web-browser.

Description

Oriol Torrent Santiago has discovered that phpMyAdmin fails to validate input to the “convcharset” variable, rendering it vulnerable to cross-site scripting attacks.

Impact

By sending a specially-crafted request, an attacker can inject and execute malicious script code, potentially compromising the victim’s browser.

Workaround

There is no known workaround at this time.

Resolution

All phpMyAdmin users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.2_rc1"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-db/phpmyadmin< 2.6.2_rc1UNKNOWN

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.006

Percentile

78.4%