PMASA-2012-4
Announcement-ID: PMASA-2012-4
Date: 2012-08-16
Summary
phpMyAdmin 3.4.11.1之前版本、3.5.2.2 之前版本在实现上存在多个HTML注入漏洞,攻击者可利用这些漏洞注入HTML和JS代码到受影响站点,导致窃取身份验证凭证并控制站点外观。
Multiple XSS in Table operations, Database structure, Trigger and Visualize GIS data pages.
Description
Using a crafted table name, it was possible to produce a XSS : 1) On the Database Structure page, creating a new table with a crafted name 2) On the Database Structure page, using the Empty and Drop links of the crafted table name 3) On the Table Operations page of a crafted table, using the ‘Empty the table (TRUNCATE)’ and ‘Delete the table (DROP)’ links 4) On the Triggers page of a database containing tables with a crafted name, when opening the ‘Add Trigger’ popup 5) When creating a trigger for a table with a crafted name, with an invalid definition. Having crafted data in a database table, it was possible to produce a XSS : 6) When visualizing GIS data, having a crafted label name.
Severity
We consider these vulnerabilities to be non critical.
Mitigation factor
These XSS can only be triggered when a table with a crafted name is already present, or if crafted data is already stored in a database table.
Affected Versions
Versions 3.4.x are affected, for issues #1 and #2. Versions 3.5.x are affected, for all issues.
Solution
Upgrade to phpMyAdmin 3.4.11.1 or 3.5.2.2 or newer or apply the patches listed below.
http://www.phpmyadmin.net/home_page/security/PMASA-2012-4.php
No Responses (yet)
Stay in touch with the conversation, subscribe to the RSS feed for comments on this post.