<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> <glsa id="200411-36"> <title>phpMyAdmin: Multiple XSS vulnerabilities</title> <synopsis> phpMyAdmin is vulnerable to cross-site scripting attacks. </synopsis> <product type="ebuild">phpmyadmin</product> <announced>2004-11-27</announced> <revised count="01">2004-11-27</revised> <bug>71819</bug> <access>remote</access> <affected> <package name="dev-db/phpmyadmin" auto="yes" arch="*"> <unaffected range="ge">2.6.0_p3</unaffected> <vulnerable range="lt">2.6.0_p3</vulnerable> </package> </affected> <background> <p> phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL databases from a web-browser. </p> </background> <description> <p> Cedric Cochin has discovered multiple cross-site scripting vulnerabilities in phpMyAdmin. These vulnerabilities can be exploited through the PmaAbsoluteUri parameter, the zero_rows parameter in read_dump.php, the confirm form, or an error message generated by the internal phpMyAdmin parser. </p> </description> <impact type="low"> <p> By sending a specially-crafted request, an attacker can inject and execute malicious script code, potentially compromising the victim's browser. </p> </impact> <workaround> <p> There is no known workaround at this time. </p> </workaround> <resolution> <p> All phpMyAdmin users should upgrade to the latest version: </p> <code> # emerge --sync # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.0_p3"</code> </resolution> <references> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1055">CAN-2004-1055</uri> <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-3">PMASA-2004-3</uri> <uri link="http://www.netvigilance.com/html/advisory0005.htm">netVigilance Advisory</uri> </references> <metadata tag="requester" timestamp="2004-11-24T09:03:21Z"> jaervosz </metadata> <metadata tag="bugReady" timestamp="2004-11-26T10:27:24Z"> koon </metadata> <metadata tag="submitter" timestamp="2004-11-26T19:21:36Z"> lewk </metadata> </glsa>