error.php in PhpMyAdmin 3.3.8.1, and other versions before 3.4.0-beta1, allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted BBcode tag containing "@" characters, as demonstrated using "[a@url@page]".
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2011/0027 | vdb entry vendor advisory |
http://www.vupen.com/english/advisories/2011/0001 | vdb entry vendor advisory |
http://www.securityfocus.com/bid/45633 | vdb entry |
http://secunia.com/advisories/42485 | third party advisory vendor advisory |
http://www.debian.org/security/2010/dsa-2139 | vendor advisory |
http://www.exploit-db.com/exploits/15699 | exploit |
http://www.phpmyadmin.net/home_page/security/PMASA-2010-9.php | |
http://www.vupen.com/english/advisories/2010/3133 | vdb entry vendor advisory |
http://secunia.com/advisories/42725 | third party advisory vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:000 | vendor advisory |