Debian Security Advisory DSA-2975-1 email@example.com
http://www.debian.org/security/ Thijs Kinkhorst
July 09, 2014 http://www.debian.org/security/faq
Package : phpmyadmin CVE ID : CVE-2013-4995 CVE-2013-4996 CVE-2013-5002 CVE-2013-5003 CVE-2014-1879
Several vulnerabilities have been discovered in phpMyAdmin, a tool to administer MySQL over the web. The Common Vulnerabilities and Exposures project identifies the following problems:
Authenticatd users could inject arbitrary web script or HTML via a crafted SQL query.
Cross site scripting was possible via a crafted logo URL in the navigation panel or a crafted entry in the Trusted Proxy list.
Authenticated users could inject arbitrary web script or HTML via a crafted pageNumber value in Schema Export.
Authenticated users could execute arbitrary SQL commands as the phpMyAdmin 'control user' via the scale parameter PMD PDF export and the pdf_page_number parameter in Schema Export.
Authenticated users could inject arbitrary web script or HTML via a crafted file name in the Import function.
For the stable distribution (wheezy), these problems have been fixed in version 4:18.104.22.168-2+deb7u1.
For the unstable distribution (sid), these problems have been fixed in version 4:4.2.5-1.
We recommend that you upgrade your phpmyadmin packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: firstname.lastname@example.org