Multiple cross-site scripting (XSS) vulnerabilities in the export page (display_export.lib.php) in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allow remote attackers to inject arbitrary web script or HTML via the pma_db_filename_template cookie.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.phpmyadmin.net/home_page/security/PMASA-2009-2.php | patch vendor advisory |
http://security.gentoo.org/glsa/glsa-200906-03.xml | vendor advisory |
http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/trunk/phpMyAdmin/libraries/display_export.lib.php?r1=11986&r2=12302&pathrev=12302 | |
http://www.securityfocus.com/bid/34251 | vdb entry |
http://secunia.com/advisories/34642 | third party advisory vendor advisory |
http://www.debian.org/security/2009/dsa-1824 | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:115 | vendor advisory |
http://secunia.com/advisories/34430 | third party advisory vendor advisory |
http://secunia.com/advisories/35635 | third party advisory vendor advisory |
http://secunia.com/advisories/35585 | third party advisory vendor advisory |