phpmyadmin -- XSS and sensitive data leakage

ID 00EC1BE1-22BB-11E6-9EAD-6805CA0B3D42
Type freebsd
Reporter FreeBSD
Modified 2016-05-26T00:00:00


The phpmyadmin development team reports:

Description Because user SQL queries are part of the URL, sensitive information made as part of a user query can be exposed by clicking on external links to attackers monitoring user GET query parameters or included in the webserver logs. Severity We consider this to be non-critical.

Description A specially crafted attack could allow for special HTML characters to be passed as URL encoded values and displayed back as special characters in the page. Severity We consider this to be non-critical.