Gentoo Archives: gentoo-announce

From: Luke Macken <lewk@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200411-36 ] phpMyAdmin: Multiple XSS vulnerabilities
Date: Sat, 27 Nov 2004 13:58:56
Message-Id: 1101563862.12269.2.camel@tomservo
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200411-36
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Low
8 Title: phpMyAdmin: Multiple XSS vulnerabilities
9 Date: November 27, 2004
10 Bugs: #71819
11 ID: 200411-36
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 phpMyAdmin is vulnerable to cross-site scripting attacks.
19
20 Background
21 ==========
22
23 phpMyAdmin is a tool written in PHP intended to handle the
24 administration of MySQL databases from a web-browser.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 dev-db/phpmyadmin < 2.6.0_p3 >= 2.6.0_p3
33
34 Description
35 ===========
36
37 Cedric Cochin has discovered multiple cross-site scripting
38 vulnerabilities in phpMyAdmin. These vulnerabilities can be exploited
39 through the PmaAbsoluteUri parameter, the zero_rows parameter in
40 read_dump.php, the confirm form, or an error message generated by the
41 internal phpMyAdmin parser.
42
43 Impact
44 ======
45
46 By sending a specially-crafted request, an attacker can inject and
47 execute malicious script code, potentially compromising the victim's
48 browser.
49
50 Workaround
51 ==========
52
53 There is no known workaround at this time.
54
55 Resolution
56 ==========
57
58 All phpMyAdmin users should upgrade to the latest version:
59
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.0_p3"
62
63 References
64 ==========
65
66 [ 1 ] CAN-2004-1055
67 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1055
68 [ 2 ] PMASA-2004-3
69 http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-3
70 [ 3 ] netVigilance Advisory
71 http://www.netvigilance.com/html/advisory0005.htm
72
73 Availability
74 ============
75
76 This GLSA and any updates to it are available for viewing at
77 the Gentoo Security Website:
78
79 http://security.gentoo.org/glsa/glsa-200411-36.xml
80
81 Concerns?
82 =========
83
84 Security is a primary focus of Gentoo Linux and ensuring the
85 confidentiality and security of our users machines is of utmost
86 importance to us. Any security concerns should be addressed to
87 security@g.o or alternatively, you may file a bug at
88 http://bugs.gentoo.org.
89
90 License
91 =======
92
93 Copyright 2004 Gentoo Foundation, Inc; referenced text
94 belongs to its owner(s).
95
96 The contents of this document are licensed under the
97 Creative Commons - Attribution / Share Alike license.
98
99 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature