Executive Summary
Summary | |
---|---|
Title | New phpmyadmin packages fix several vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-880 | First vendor Publication | 2005-11-02 |
Vendor | Debian | Last vendor Modification | 2005-11-02 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several cross-site scripting vulnerabilities have been discovered in phpmyadmin, a set of PHP-scripts to administrate MySQL over the WWW. The Common Vulnerabilities and Exposures project identifies the following problems: CAN-2005-2869 Andreas Kerber and Michal Cihar discovered several cross-site scripting vulnerabilities in the error page and in the cookie login. CVE-2005-3300 Stefan Esser discovered missing safety checks in grab_globals.php that could allow an attacker to induce phpmyadmin to include an arbitrary local file. CVE-2005-3301 Tobias Klein discovered several cross-site scripting vulnerabilities that could allow attackers to inject arbitrary HTML or client-side scripting. The version in the old stable distribution (woody) has probably its own flaws and is not easily fixable without a full audit and patch session. The easier way is to upgrade it from woody to sarge. For the stable distribution (sarge) these problems have been fixed in version 2.6.2-3sarge1. For the unstable distribution (sid) these problems have been fixed in version 2.6.4-pl1-1. We recommend that you upgrade your phpmyadmin package. |
Original Source
Url : http://www.debian.org/security/2005/dsa-880 |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200510-21 (phpmyadmin) File : nvt/glsa_200510_21.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 880-1 (phpmyadmin) File : nvt/deb_880_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
20262 | phpMyAdmin server_databases.php XSS |
20261 | phpMyAdmin queryframe.php XSS |
20260 | phpMyAdmin left.php XSS |
20259 | phpMyAdmin register_globals Compatibility Layer Local File Inclusion |
19049 | phpMyAdmin Cookie Username Field XSS phpMyAdmin contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the Username field upon submission to the libraries/auth/cookie.auth.lib.php script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. |
19048 | phpMyAdmin error.php error Parameter XSS phpMyAdmin contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the error parameter for arbitrary HTML or web script upon submission to the error.php script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-880.nasl - Type : ACT_GATHER_INFO |
2005-11-21 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2005_066.nasl - Type : ACT_GATHER_INFO |
2005-10-28 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200510-21.nasl - Type : ACT_GATHER_INFO |
2005-10-26 | Name : The remote web server contains a PHP application that is prone to several flaws. File : phpMyAdmin_264pl3.nasl - Type : ACT_ATTACK |
2005-08-29 | Name : The remote web server contains a PHP application that is affected by cross-si... File : phpMyAdmin_264.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:35 |
|