Multiple cross-site scripting (XSS) vulnerabilities in PhpMyAdmin before 2.9.1.1 allow remote attackers to inject arbitrary HTML or web script via (1) a comment for a table name, as exploited through (a) db_operations.php, (2) the db parameter to (b) db_create.php, (3) the newname parameter to db_operations.php, the (4) query_history_latest, (5) query_history_latest_db, and (6) querydisplay_tab parameters to (c) querywindow.php, and (7) the pos parameter to (d) sql.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-7 | patch vendor advisory |
http://www.vupen.com/english/advisories/2006/4572 | vdb entry not applicable |
http://secunia.com/advisories/26733 | third party advisory permissions required |
http://marc.info/?l=bugtraq&m=116370414309444&w=2 | third party advisory mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30310 | vdb entry |
http://www.us.debian.org/security/2007/dsa-1370 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/21137 | vdb entry third party advisory |