phpmyadmin -- XSS and sensitive data leakage

2016-05-25T00:00:00
ID 00EC1BE1-22BB-11E6-9EAD-6805CA0B3D42
Type freebsd
Reporter FreeBSD
Modified 2016-05-26T00:00:00

Description

The phpmyadmin development team reports:

Description Because user SQL queries are part of the URL, sensitive information made as part of a user query can be exposed by clicking on external links to attackers monitoring user GET query parameters or included in the webserver logs. Severity We consider this to be non-critical.

Description A specially crafted attack could allow for special HTML characters to be passed as URL encoded values and displayed back as special characters in the page. Severity We consider this to be non-critical.