ID OPENVAS:863999 Type openvas Reporter Copyright (c) 2012 Greenbone Networks GmbH Modified 2018-01-09T00:00:00
Description
Check for the Version of phpMyAdmin
###############################################################################
# OpenVAS Vulnerability Test
#
# Fedora Update for phpMyAdmin FEDORA-2011-16768
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
include("revisions-lib.inc");
tag_insight = "phpMyAdmin is a tool written in PHP intended to handle the administration of
MySQL over the World Wide Web. Most frequently used operations are supported
by the user interface (managing databases, tables, fields, relations, indexes,
users, permissions), while you still have the ability to directly execute any
SQL statement.
Features include an intuitive web interface, support for most MySQL features
(browse and drop databases, tables, views, fields and indexes, create, copy,
drop, rename and alter databases, tables, fields and indexes, maintenance
server, databases and tables, with proposals on server configuration, execute,
edit and bookmark any SQL-statement, even batch-queries, manage MySQL users
and privileges, manage stored procedures and triggers), import data from CSV
and SQL, export data to various formats: CSV, SQL, XML, PDF, OpenDocument Text
and Spreadsheet, Word, Excel, LATEX and others, administering multiple servers,
creating PDF graphics of your database layout, creating complex queries using
Query-by-example (QBE), searching globally in a database or a subset of it,
transforming stored data into any format using a set of predefined functions,
like displaying BLOB-data as image or download-link and much more...";
tag_affected = "phpMyAdmin on Fedora 16";
tag_solution = "Please Install the Updated Packages.";
if(description)
{
script_xref(name : "URL" , value : "http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071040.html");
script_id(863999);
script_version("$Revision: 8336 $");
script_tag(name:"last_modification", value:"$Date: 2018-01-09 08:01:48 +0100 (Tue, 09 Jan 2018) $");
script_tag(name:"creation_date", value:"2012-04-02 12:53:08 +0530 (Mon, 02 Apr 2012)");
script_cve_id("CVE-2011-4634");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_xref(name: "FEDORA", value: "2011-16768");
script_name("Fedora Update for phpMyAdmin FEDORA-2011-16768");
script_tag(name: "summary" , value: "Check for the Version of phpMyAdmin");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2012 Greenbone Networks GmbH");
script_family("Fedora Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms");
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "insight" , value : tag_insight);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("pkg-lib-rpm.inc");
release = get_kb_item("ssh/login/release");
res = "";
if(release == NULL){
exit(0);
}
if(release == "FC16")
{
if ((res = isrpmvuln(pkg:"phpMyAdmin", rpm:"phpMyAdmin~3.4.8~1.fc16", rls:"FC16")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
{"id": "OPENVAS:863999", "type": "openvas", "bulletinFamily": "scanner", "title": "Fedora Update for phpMyAdmin FEDORA-2011-16768", "description": "Check for the Version of phpMyAdmin", "published": "2012-04-02T00:00:00", "modified": "2018-01-09T00:00:00", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=863999", "reporter": "Copyright (c) 2012 Greenbone Networks GmbH", "references": ["http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071040.html", "2011-16768"], "cvelist": ["CVE-2011-4634"], "lastseen": "2018-01-11T11:07:34", "viewCount": 3, "enchantments": {"score": {"value": 5.9, "vector": "NONE", "modified": "2018-01-11T11:07:34", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2011-4634"]}, {"type": "openvas", "idList": ["OPENVAS:136141256231070597", "OPENVAS:1361412562310831522", "OPENVAS:1361412562310108236", "OPENVAS:136141256231070802", "OPENVAS:1361412562310863663", "OPENVAS:1361412562310108235", "OPENVAS:831522", "OPENVAS:863663", "OPENVAS:70597", "OPENVAS:1361412562310863999"]}, {"type": "nessus", "idList": ["FREEBSD_PKG_ED5363361C5711E186F4E0CB4E266481.NASL", "OPENSUSE-2011-94.NASL", "PHPMYADMIN_PMASA_2011_18.NASL", "FEDORA_2011-16786.NASL", "GENTOO_GLSA-201201-01.NASL", "FEDORA_2011-16768.NASL"]}, {"type": "seebug", "idList": ["SSV:26082"]}, {"type": "phpmyadmin", "idList": ["PHPMYADMIN:PMASA-2011-18"]}, {"type": "freebsd", "idList": ["ED536336-1C57-11E1-86F4-E0CB4E266481"]}, {"type": "gentoo", "idList": ["GLSA-201201-01"]}], "modified": "2018-01-11T11:07:34", "rev": 2}, "vulnersScore": 5.9}, "pluginID": "863999", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for phpMyAdmin FEDORA-2011-16768\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"phpMyAdmin is a tool written in PHP intended to handle the administration of\n MySQL over the World Wide Web. Most frequently used operations are supported\n by the user interface (managing databases, tables, fields, relations, indexes,\n users, permissions), while you still have the ability to directly execute any\n SQL statement.\n\n Features include an intuitive web interface, support for most MySQL features\n (browse and drop databases, tables, views, fields and indexes, create, copy,\n drop, rename and alter databases, tables, fields and indexes, maintenance\n server, databases and tables, with proposals on server configuration, execute,\n edit and bookmark any SQL-statement, even batch-queries, manage MySQL users\n and privileges, manage stored procedures and triggers), import data from CSV\n and SQL, export data to various formats: CSV, SQL, XML, PDF, OpenDocument Text\n and Spreadsheet, Word, Excel, LATEX and others, administering multiple servers,\n creating PDF graphics of your database layout, creating complex queries using\n Query-by-example (QBE), searching globally in a database or a subset of it,\n transforming stored data into any format using a set of predefined functions,\n like displaying BLOB-data as image or download-link and much more...\";\n\ntag_affected = \"phpMyAdmin on Fedora 16\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071040.html\");\n script_id(863999);\n script_version(\"$Revision: 8336 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-09 08:01:48 +0100 (Tue, 09 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-04-02 12:53:08 +0530 (Mon, 02 Apr 2012)\");\n script_cve_id(\"CVE-2011-4634\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name: \"FEDORA\", value: \"2011-16768\");\n script_name(\"Fedora Update for phpMyAdmin FEDORA-2011-16768\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of phpMyAdmin\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"phpMyAdmin\", rpm:\"phpMyAdmin~3.4.8~1.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "naslFamily": "Fedora Local Security Checks"}
{"cve": [{"lastseen": "2020-10-03T11:39:34", "description": "Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.4.x before 3.4.8 allow remote attackers to inject arbitrary web script or HTML via (1) a crafted database name, related to the Database Synchronize panel; (2) a crafted database name, related to the Database rename panel; (3) a crafted SQL query, related to the table overview panel; (4) a crafted SQL query, related to the view creation dialog; (5) a crafted column type, related to the table search dialog; or (6) a crafted column type, related to the create index dialog.", "edition": 3, "cvss3": {}, "published": "2011-12-22T20:55:00", "title": "CVE-2011-4634", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-4634"], "modified": "2012-11-06T05:04:00", "cpe": ["cpe:/a:phpmyadmin:phpmyadmin:3.4.4.0", "cpe:/a:phpmyadmin:phpmyadmin:3.4.0.0", "cpe:/a:phpmyadmin:phpmyadmin:3.4.1.0", "cpe:/a:phpmyadmin:phpmyadmin:3.4.3.2", "cpe:/a:phpmyadmin:phpmyadmin:3.4.3.1", "cpe:/a:phpmyadmin:phpmyadmin:3.4.2.0", "cpe:/a:phpmyadmin:phpmyadmin:3.4.7.0", "cpe:/a:phpmyadmin:phpmyadmin:3.4.5.0", "cpe:/a:phpmyadmin:phpmyadmin:3.4.3.0", "cpe:/a:phpmyadmin:phpmyadmin:3.4.6.0"], "id": "CVE-2011-4634", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4634", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.2.0:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2019-05-29T18:34:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4634"], "description": "phpMyAdmin is prone to multiple cross-site scripting (XSS) vulnerabilities.", "modified": "2018-10-26T00:00:00", "published": "2017-09-11T00:00:00", "id": "OPENVAS:1361412562310108236", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310108236", "type": "openvas", "title": "phpMyAdmin 'CVE-2011-4634' Multiple Cross-Site Scripting (XSS) Vulnerabilities (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_phpmyadmin_cve-2011-4634_lin.nasl 12106 2018-10-26 06:33:36Z cfischer $\n#\n# phpMyAdmin 'CVE-2011-4634' Multiple Cross-Site Scripting (XSS) Vulnerabilities (Linux)\n#\n# Authors:\n# Christian Fischer <christian.fischer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:phpmyadmin:phpmyadmin\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.108236\");\n script_version(\"$Revision: 12106 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 08:33:36 +0200 (Fri, 26 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2017-09-11 08:48:02 +0200 (Mon, 11 Sep 2017)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_cve_id(\"CVE-2011-4634\");\n script_name(\"phpMyAdmin 'CVE-2011-4634' Multiple Cross-Site Scripting (XSS) Vulnerabilities (Linux)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"secpod_phpmyadmin_detect_900129.nasl\", \"os_detection.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_mandatory_keys(\"phpMyAdmin/installed\", \"Host/runs_unixoide\");\n\n script_xref(name:\"URL\", value:\"https://www.phpmyadmin.net/security/PMASA-2011-18/\");\n\n script_tag(name:\"summary\", value:\"phpMyAdmin is prone to multiple cross-site scripting (XSS) vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"affected\", value:\"phpMyAdmin 3.4.x before 3.4.8.\");\n\n script_tag(name:\"solution\", value:\"Update to version 3.4.8 or newer.\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner_unreliable\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! port = get_app_port( cpe:CPE ) ) exit( 0 );\nif( ! vers = get_app_version( cpe:CPE, port:port ) ) exit( 0 );\n\nif( vers =~ \"^3\\.4\\.\" ) {\n if( version_is_less( version:vers, test_version:\"3.4.8\" ) ) {\n report = report_fixed_ver( installed_version:vers, fixed_version:\"3.4.8\" );\n security_message( port:port, data:report );\n exit( 0 );\n }\n}\n\nexit( 99 );\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:34:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4634"], "description": "phpMyAdmin is prone to multiple cross-site scripting (XSS) vulnerabilities.", "modified": "2018-10-26T00:00:00", "published": "2017-09-11T00:00:00", "id": "OPENVAS:1361412562310108235", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310108235", "type": "openvas", "title": "phpMyAdmin 'CVE-2011-4634' Multiple Cross-Site Scripting (XSS) Vulnerabilities (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_phpmyadmin_cve-2011-4634_win.nasl 12106 2018-10-26 06:33:36Z cfischer $\n#\n# phpMyAdmin 'CVE-2011-4634' Multiple Cross-Site Scripting (XSS) Vulnerabilities (Windows)\n#\n# Authors:\n# Christian Fischer <christian.fischer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:phpmyadmin:phpmyadmin\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.108235\");\n script_version(\"$Revision: 12106 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 08:33:36 +0200 (Fri, 26 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2017-09-11 08:48:02 +0200 (Mon, 11 Sep 2017)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_cve_id(\"CVE-2011-4634\");\n script_name(\"phpMyAdmin 'CVE-2011-4634' Multiple Cross-Site Scripting (XSS) Vulnerabilities (Windows)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"secpod_phpmyadmin_detect_900129.nasl\", \"os_detection.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_mandatory_keys(\"phpMyAdmin/installed\", \"Host/runs_windows\");\n\n script_xref(name:\"URL\", value:\"https://www.phpmyadmin.net/security/PMASA-2011-18/\");\n\n script_tag(name:\"summary\", value:\"phpMyAdmin is prone to multiple cross-site scripting (XSS) vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"affected\", value:\"phpMyAdmin 3.4.x before 3.4.8.\");\n\n script_tag(name:\"solution\", value:\"Update to version 3.4.8 or newer.\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! port = get_app_port( cpe:CPE ) ) exit( 0 );\nif( ! vers = get_app_version( cpe:CPE, port:port ) ) exit( 0 );\n\nif( vers =~ \"^3\\.4\\.\" ) {\n if( version_is_less( version:vers, test_version:\"3.4.8\" ) ) {\n report = report_fixed_ver( installed_version:vers, fixed_version:\"3.4.8\" );\n security_message( port:port, data:report );\n exit( 0 );\n }\n}\n\nexit( 99 );\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:38:37", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4634"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-04-02T00:00:00", "id": "OPENVAS:1361412562310863999", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310863999", "type": "openvas", "title": "Fedora Update for phpMyAdmin FEDORA-2011-16768", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for phpMyAdmin FEDORA-2011-16768\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071040.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.863999\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-04-02 12:53:08 +0530 (Mon, 02 Apr 2012)\");\n script_cve_id(\"CVE-2011-4634\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name:\"FEDORA\", value:\"2011-16768\");\n script_name(\"Fedora Update for phpMyAdmin FEDORA-2011-16768\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'phpMyAdmin'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC16\");\n script_tag(name:\"affected\", value:\"phpMyAdmin on Fedora 16\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"phpMyAdmin\", rpm:\"phpMyAdmin~3.4.8~1.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2017-07-02T21:10:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4634"], "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2017-04-11T00:00:00", "published": "2012-02-13T00:00:00", "id": "OPENVAS:70597", "href": "http://plugins.openvas.org/nasl.php?oid=70597", "type": "openvas", "title": "FreeBSD Ports: phpMyAdmin", "sourceData": "#\n#VID ed536336-1c57-11e1-86f4-e0cb4e266481\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from VID ed536336-1c57-11e1-86f4-e0cb4e266481\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following package is affected: phpMyAdmin\n\nCVE-2011-4634\nMultiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin\n3.4.x before 3.4.8 allow remote attackers to inject arbitrary web\nscript or HTML via (1) a crafted database name, related to the\nDatabase Synchronize panel; (2) a crafted database name, related to\nthe Database rename panel; (3) a crafted SQL query, related to the\ntable overview panel; (4) a crafted SQL query, related to the view\ncreation dialog; (5) a crafted column type, related to the table\nsearch dialog; or (6) a crafted column type, related to the create\nindex dialog.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php\nhttp://www.vuxml.org/freebsd/ed536336-1c57-11e1-86f4-e0cb4e266481.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\n\nif(description)\n{\n script_id(70597);\n script_tag(name:\"creation_date\", value:\"2012-02-13 01:48:16 +0100 (Mon, 13 Feb 2012)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-04-11 11:02:04 +0200 (Tue, 11 Apr 2017) $\");\n script_cve_id(\"CVE-2011-4634\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_version(\"$Revision: 5931 $\");\n script_name(\"FreeBSD Ports: phpMyAdmin\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"phpMyAdmin\");\nif(!isnull(bver) && revcomp(a:bver, b:\"3.4\")>0 && revcomp(a:bver, b:\"3.4.8.r1\")<0) {\n txt += 'Package phpMyAdmin version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-07-25T10:55:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4634"], "description": "Check for the Version of phpMyAdmin", "modified": "2017-07-10T00:00:00", "published": "2011-12-19T00:00:00", "id": "OPENVAS:863663", "href": "http://plugins.openvas.org/nasl.php?oid=863663", "type": "openvas", "title": "Fedora Update for phpMyAdmin FEDORA-2011-16786", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for phpMyAdmin FEDORA-2011-16786\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"phpMyAdmin is a tool written in PHP intended to handle the administration of\n MySQL over the World Wide Web. Most frequently used operations are supported\n by the user interface (managing databases, tables, fields, relations, indexes,\n users, permissions), while you still have the ability to directly execute any\n SQL statement.\n\n Features include an intuitive web interface, support for most MySQL features\n (browse and drop databases, tables, views, fields and indexes, create, copy,\n drop, rename and alter databases, tables, fields and indexes, maintenance\n server, databases and tables, with proposals on server configuration, execute,\n edit and bookmark any SQL-statement, even batch-queries, manage MySQL users\n and privileges, manage stored procedures and triggers), import data from CSV\n and SQL, export data to various formats: CSV, SQL, XML, PDF, OpenDocument Text\n and Spreadsheet, Word, Excel, LATEX and others, administering multiple servers,\n creating PDF graphics of your database layout, creating complex queries using\n Query-by-example (QBE), searching globally in a database or a subset of it,\n transforming stored data into any format using a set of predefined functions,\n like displaying BLOB-data as image or download-link and much more...\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"phpMyAdmin on Fedora 15\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071019.html\");\n script_id(863663);\n script_version(\"$Revision: 6626 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:30:10 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-12-19 12:23:17 +0530 (Mon, 19 Dec 2011)\");\n script_xref(name: \"FEDORA\", value: \"2011-16786\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_cve_id(\"CVE-2011-4634\");\n script_name(\"Fedora Update for phpMyAdmin FEDORA-2011-16786\");\n\n script_summary(\"Check for the Version of phpMyAdmin\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC15\")\n{\n\n if ((res = isrpmvuln(pkg:\"phpMyAdmin\", rpm:\"phpMyAdmin~3.4.8~1.fc15\", rls:\"FC15\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2019-05-29T18:39:15", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4634"], "description": "The remote host is missing an update to the system\n as announced in the referenced advisory.", "modified": "2019-03-12T00:00:00", "published": "2012-02-13T00:00:00", "id": "OPENVAS:136141256231070597", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231070597", "type": "openvas", "title": "FreeBSD Ports: phpMyAdmin", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: freebsd_phpMyAdmin28.nasl 14117 2019-03-12 14:02:42Z cfischer $\n#\n# Auto generated from VID ed536336-1c57-11e1-86f4-e0cb4e266481\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.70597\");\n script_tag(name:\"creation_date\", value:\"2012-02-13 01:48:16 +0100 (Mon, 13 Feb 2012)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-12 15:02:42 +0100 (Tue, 12 Mar 2019) $\");\n script_cve_id(\"CVE-2011-4634\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_version(\"$Revision: 14117 $\");\n script_name(\"FreeBSD Ports: phpMyAdmin\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsd\", \"ssh/login/freebsdrel\");\n\n script_tag(name:\"insight\", value:\"The following package is affected: phpMyAdmin\n\nCVE-2011-4634\nMultiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin\n3.4.x before 3.4.8 allow remote attackers to inject arbitrary web\nscript or HTML via (1) a crafted database name, related to the\nDatabase Synchronize panel, (2) a crafted database name, related to\nthe Database rename panel, (3) a crafted SQL query, related to the\ntable overview panel, (4) a crafted SQL query, related to the view\ncreation dialog, (5) a crafted column type, related to the table\nsearch dialog, or (6) a crafted column type, related to the create\nindex dialog.\");\n\n script_tag(name:\"solution\", value:\"Update your system with the appropriate patches or\n software upgrades.\");\n\n script_xref(name:\"URL\", value:\"http://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php\");\n script_xref(name:\"URL\", value:\"http://www.vuxml.org/freebsd/ed536336-1c57-11e1-86f4-e0cb4e266481.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update to the system\n as announced in the referenced advisory.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-bsd.inc\");\n\nvuln = FALSE;\ntxt = \"\";\n\nbver = portver(pkg:\"phpMyAdmin\");\nif(!isnull(bver) && revcomp(a:bver, b:\"3.4\")>0 && revcomp(a:bver, b:\"3.4.8.r1\")<0) {\n txt += 'Package phpMyAdmin version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = TRUE;\n}\n\nif(vuln) {\n security_message(data:txt);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:39:53", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4634"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-12-19T00:00:00", "id": "OPENVAS:1361412562310863663", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310863663", "type": "openvas", "title": "Fedora Update for phpMyAdmin FEDORA-2011-16786", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for phpMyAdmin FEDORA-2011-16786\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071019.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.863663\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-12-19 12:23:17 +0530 (Mon, 19 Dec 2011)\");\n script_xref(name:\"FEDORA\", value:\"2011-16786\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_cve_id(\"CVE-2011-4634\");\n script_name(\"Fedora Update for phpMyAdmin FEDORA-2011-16786\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'phpMyAdmin'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC15\");\n script_tag(name:\"affected\", value:\"phpMyAdmin on Fedora 15\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC15\")\n{\n\n if ((res = isrpmvuln(pkg:\"phpMyAdmin\", rpm:\"phpMyAdmin~3.4.8~1.fc15\", rls:\"FC15\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:38:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4634", "CVE-2011-4107", "CVE-2011-4782", "CVE-2011-4780"], "description": "The remote host is missing an update for the ", "modified": "2019-03-12T00:00:00", "published": "2012-01-09T00:00:00", "id": "OPENVAS:1361412562310831522", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831522", "type": "openvas", "title": "Mandriva Update for phpmyadmin MDVSA-2011:198 (phpmyadmin)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for phpmyadmin MDVSA-2011:198 (phpmyadmin)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.mandriva.com/security-announce/2012-01/msg00000.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831522\");\n script_version(\"$Revision: 14114 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-12 12:48:52 +0100 (Tue, 12 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-01-09 13:30:32 +0530 (Mon, 09 Jan 2012)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n script_xref(name:\"MDVSA\", value:\"2011:198\");\n script_cve_id(\"CVE-2011-4107\", \"CVE-2011-4634\", \"CVE-2011-4782\", \"CVE-2011-4780\");\n script_name(\"Mandriva Update for phpmyadmin MDVSA-2011:198 (phpmyadmin)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'phpmyadmin'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\", re:\"ssh/login/release=MNDK_mes5\");\n script_tag(name:\"affected\", value:\"phpmyadmin on Mandriva Enterprise Server 5,\n Mandriva Enterprise Server 5/X86_64\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities has been found and corrected in phpmyadmin:\n\n Importing a specially-crafted XML file which contains an XML entity\n injection permits to retrieve a local file (limited by the privileges\n of the user running the web server) (CVE-2011-4107).\n\n Using crafted database names, it was possible to produce XSS in the\n Database Synchronize and Database rename panels. Using an invalid\n and crafted SQL query, it was possible to produce XSS when editing\n a query on a table overview panel or when using the view creation\n dialog. Using a crafted column type, it was possible to produce XSS\n in the table search and create index dialogs (CVE-2011-4634).\n\n Crafted values entered in the setup interface can produce XSS. Also,\n if the config directory exists and is writeable, the XSS payload can\n be saved to this directory (CVE-2011-4782).\n\n Using crafted url parameters, it was possible to produce XSS\n on the export panels in the server, database and table sections\n (CVE-2011-4780).\n\n This upgrade provides the latest phpmyadmin version (3.4.9) to address\n these vulnerabilities.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MNDK_mes5\")\n{\n\n if ((res = isrpmvuln(pkg:\"phpmyadmin\", rpm:\"phpmyadmin~3.4.9~0.1mdvmes5.2\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2018-01-06T13:07:01", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4634", "CVE-2011-4107", "CVE-2011-4782", "CVE-2011-4780"], "description": "Check for the Version of phpmyadmin", "modified": "2018-01-05T00:00:00", "published": "2012-01-09T00:00:00", "id": "OPENVAS:831522", "href": "http://plugins.openvas.org/nasl.php?oid=831522", "type": "openvas", "title": "Mandriva Update for phpmyadmin MDVSA-2011:198 (phpmyadmin)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for phpmyadmin MDVSA-2011:198 (phpmyadmin)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities has been found and corrected in phpmyadmin:\n\n Importing a specially-crafted XML file which contains an XML entity\n injection permits to retrieve a local file (limited by the privileges\n of the user running the web server) (CVE-2011-4107).\n\n Using crafted database names, it was possible to produce XSS in the\n Database Synchronize and Database rename panels. Using an invalid\n and crafted SQL query, it was possible to produce XSS when editing\n a query on a table overview panel or when using the view creation\n dialog. Using a crafted column type, it was possible to produce XSS\n in the table search and create index dialogs (CVE-2011-4634).\n\n Crafted values entered in the setup interface can produce XSS; also,\n if the config directory exists and is writeable, the XSS payload can\n be saved to this directory (CVE-2011-4782).\n\n Using crafted url parameters, it was possible to produce XSS\n on the export panels in the server, database and table sections\n (CVE-2011-4780).\n\n This upgrade provides the latest phpmyadmin version (3.4.9) to address\n these vulnerabilities.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"phpmyadmin on Mandriva Enterprise Server 5,\n Mandriva Enterprise Server 5/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2012-01/msg00000.php\");\n script_id(831522);\n script_version(\"$Revision: 8295 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-05 07:29:18 +0100 (Fri, 05 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-01-09 13:30:32 +0530 (Mon, 09 Jan 2012)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n script_xref(name: \"MDVSA\", value: \"2011:198\");\n script_cve_id(\"CVE-2011-4107\", \"CVE-2011-4634\", \"CVE-2011-4782\", \"CVE-2011-4780\");\n script_name(\"Mandriva Update for phpmyadmin MDVSA-2011:198 (phpmyadmin)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of phpmyadmin\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_mes5\")\n{\n\n if ((res = isrpmvuln(pkg:\"phpmyadmin\", rpm:\"phpmyadmin~3.4.9~0.1mdvmes5.2\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-07-24T12:51:15", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-7252", "CVE-2010-3055", "CVE-2011-0987", "CVE-2011-2508", "CVE-2011-2642", "CVE-2011-2505", "CVE-2010-3056", "CVE-2010-2958", "CVE-2011-4634", "CVE-2011-2718", "CVE-2011-4107", "CVE-2011-2643", "CVE-2011-2506", "CVE-2011-4782", "CVE-2011-2719", "CVE-2011-3646", "CVE-2011-2507", "CVE-2008-7251", "CVE-2011-4780", "CVE-2011-0986", "CVE-2010-3263", "CVE-2011-4064"], "description": "The remote host is missing updates announced in\nadvisory GLSA 201201-01.", "modified": "2017-07-07T00:00:00", "published": "2012-02-12T00:00:00", "id": "OPENVAS:70802", "href": "http://plugins.openvas.org/nasl.php?oid=70802", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201201-01 (phpMyAdmin)", "sourceData": "#\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities were found in phpMyAdmin, the most severe\n of which allows the execution of arbitrary PHP code.\";\ntag_solution = \"All phpMyAdmin users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=dev-db/phpmyadmin-3.4.9'\n \n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20201201-01\nhttp://bugs.gentoo.org/show_bug.cgi?id=302745\nhttp://bugs.gentoo.org/show_bug.cgi?id=335490\nhttp://bugs.gentoo.org/show_bug.cgi?id=336462\nhttp://bugs.gentoo.org/show_bug.cgi?id=354227\nhttp://bugs.gentoo.org/show_bug.cgi?id=373951\nhttp://bugs.gentoo.org/show_bug.cgi?id=376369\nhttp://bugs.gentoo.org/show_bug.cgi?id=387413\nhttp://bugs.gentoo.org/show_bug.cgi?id=389427\nhttp://bugs.gentoo.org/show_bug.cgi?id=395715\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2010-1.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2010-2.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2010-4.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2010-5.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2010-6.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2010-7.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-1.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-10.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-11.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-12.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-15.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-16.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-17.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-19.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-2.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-20.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-5.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-6.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-7.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-8.php\nhttp://www.phpmyadmin.net/home_page/security/PMASA-2011-9.php\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 201201-01.\";\n\n \n \nif(description)\n{\n script_id(70802);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2008-7251\", \"CVE-2008-7252\", \"CVE-2010-2958\", \"CVE-2010-3055\", \"CVE-2010-3056\", \"CVE-2010-3263\", \"CVE-2011-0986\", \"CVE-2011-0987\", \"CVE-2011-2505\", \"CVE-2011-2506\", \"CVE-2011-2507\", \"CVE-2011-2508\", \"CVE-2011-2642\", \"CVE-2011-2643\", \"CVE-2011-2718\", \"CVE-2011-2719\", \"CVE-2011-3646\", \"CVE-2011-4064\", \"CVE-2011-4107\", \"CVE-2011-4634\", \"CVE-2011-4780\", \"CVE-2011-4782\");\n script_version(\"$Revision: 6593 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:18:14 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-02-12 10:04:41 -0500 (Sun, 12 Feb 2012)\");\n script_name(\"Gentoo Security Advisory GLSA 201201-01 (phpMyAdmin)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\nres = \"\";\nreport = \"\";\nif((res = ispkgvuln(pkg:\"dev-db/phpmyadmin\", unaffected: make_list(\"ge 3.4.9\"), vulnerable: make_list(\"lt 3.4.9\"))) != NULL ) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "seebug": [{"lastseen": "2017-11-19T17:59:20", "description": "BUGTRAQ ID: 51099\r\nCVE ID: CVE-2011-4634\r\n\r\nphpMyAdmin\u662f\u4e00\u4e2a\u7528PHP\u7f16\u5199\u7684\uff0c\u53ef\u4ee5\u901a\u8fc7web\u65b9\u5f0f\u63a7\u5236\u548c\u64cd\u4f5cMySQL\u6570\u636e\u5e93\u3002\r\n\r\nphpMyAdmin 3.4.8\u4e4b\u524d\u7248\u672c\u5728\u5b9e\u73b0\u4e0a\u5b58\u5728\u591a\u4e2a\u8de8\u7ad9\u811a\u672c\u6267\u884c\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8fd9\u4e9b\u6f0f\u6d1e\u5728\u53d7\u5f71\u54cd\u7ad9\u70b9\u7684\u7528\u6237\u6d4f\u89c8\u5668\u4e2d\u6267\u884c\u4efb\u610f\u811a\u672c\u4ee3\u7801\uff0c\u7a83\u53d6Cookie\u8eab\u4efd\u9a8c\u8bc1\u51ed\u8bc1\u3002\r\n\r\n\u4f7f\u7528\u7279\u5236\u7684\u6570\u636e\u5e93\u540d\u79f0\uff0c\u53ef\u80fd\u4f1a\u5728\u6570\u636e\u5e93\u540c\u6b65\u548c\u6570\u636e\u5e93\u91cd\u547d\u540d\u9762\u677f\u4e2d\u6267\u884cXSS\u3002\u4f7f\u7528\u65e0\u6548\u7684\u548c\u7279\u5236\u7684SQL\u67e5\u8be2\uff0c\u5728\u8868\u683c\u5168\u89c8\u9762\u677f\u4e0a\u7f16\u8f91\u67e5\u8be2\u65f6\u9020\u6210XSS\u6216\u5728\u4f7f\u7528\u521b\u5efa\u89c6\u56fe\u5bf9\u8bdd\u6846\u65f6\u6267\u884cXSS\u3002\u4f7f\u7528\u7279\u5236\u7684\u5217\u7c7b\u578b\uff0c\u53ef\u80fd\u5728\u8868\u683c\u641c\u7d22\u6216\u521b\u5efa\u7d22\u5f15\u5bf9\u8bdd\u6846\u65f6\u6267\u884cXSS\n0\nphpMyAdmin 3.4.x\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nphpMyAdmin\r\n----------\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\nhttp://www.phpmyadmin.net/home_page/security/", "published": "2011-12-19T00:00:00", "title": "phpMyAdmin 3.4.8\u4e4b\u524d\u7248\u672c\u591a\u4e2a\u8de8\u7ad9\u811a\u672c\u6267\u884c\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2011-4634"], "modified": "2011-12-19T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-26082", "id": "SSV:26082", "sourceData": "", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": ""}], "fedora": [{"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2011-4634"], "description": "phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the World Wide Web. Most frequently used operations are supported by the user interface (managing databases, tables, fields, relations, index es, users, permissions), while you still have the ability to directly execute a ny SQL statement. Features include an intuitive web interface, support for most MySQL features (browse and drop databases, tables, views, fields and indexes, create, copy, drop, rename and alter databases, tables, fields and indexes, maintenance server, databases and tables, with proposals on server configuration, execu te, edit and bookmark any SQL-statement, even batch-queries, manage MySQL users and privileges, manage stored procedures and triggers), import data from CSV and SQL, export data to various formats: CSV, SQL, XML, PDF, OpenDocument T ext and Spreadsheet, Word, Excel, LATEX and others, administering multiple serv ers, creating PDF graphics of your database layout, creating complex queries usi ng Query-by-example (QBE), searching globally in a database or a subset of it, transforming stored data into any format using a set of predefined function s, like displaying BLOB-data as image or download-link and much more... ", "modified": "2011-12-16T19:50:55", "published": "2011-12-16T19:50:55", "id": "FEDORA:0610D21141", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 15 Update: phpMyAdmin-3.4.8-1.fc15", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2011-4634"], "description": "phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the World Wide Web. Most frequently used operations are supported by the user interface (managing databases, tables, fields, relations, index es, users, permissions), while you still have the ability to directly execute a ny SQL statement. Features include an intuitive web interface, support for most MySQL features (browse and drop databases, tables, views, fields and indexes, create, copy, drop, rename and alter databases, tables, fields and indexes, maintenance server, databases and tables, with proposals on server configuration, execu te, edit and bookmark any SQL-statement, even batch-queries, manage MySQL users and privileges, manage stored procedures and triggers), import data from CSV and SQL, export data to various formats: CSV, SQL, XML, PDF, OpenDocument T ext and Spreadsheet, Word, Excel, LATEX and others, administering multiple serv ers, creating PDF graphics of your database layout, creating complex queries usi ng Query-by-example (QBE), searching globally in a database or a subset of it, transforming stored data into any format using a set of predefined function s, like displaying BLOB-data as image or download-link and much more... ", "modified": "2011-12-16T20:03:53", "published": "2011-12-16T20:03:53", "id": "FEDORA:6DD6E21B8C", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 16 Update: phpMyAdmin-3.4.8-1.fc16", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "nessus": [{"lastseen": "2021-01-01T04:54:58", "description": "The version of phpMyAdmin hosted on the remote server is 3.4.x prior\nto 3.4.8 and is affected by a cross-site scripting vulnerability. The\ndatabase name is not properly sanitized in the file\n'js/db_operations.js' when attempting to rename a database.\n\nNote that this version is reportedly affected by several other cross-\nsite scripting vulnerabilities. However, Nessus has not tested for\nthese vulnerabilities.", "edition": 24, "published": "2011-12-19T00:00:00", "title": "phpMyAdmin 3.4.x < 3.4.8 XSS (PMASA-2011-18)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4634"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:phpmyadmin:phpmyadmin"], "id": "PHPMYADMIN_PMASA_2011_18.NASL", "href": "https://www.tenable.com/plugins/nessus/57337", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(57337);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2018/07/24 18:56:11\");\n\n script_cve_id(\"CVE-2011-4634\");\n script_bugtraq_id(51099);\n\n script_name(english:\"phpMyAdmin 3.4.x < 3.4.8 XSS (PMASA-2011-18)\");\n script_summary(english:\"Checks for patch in phpMyAdmin\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote web server contains a PHP application that is affected by\na cross-site scripting vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of phpMyAdmin hosted on the remote server is 3.4.x prior\nto 3.4.8 and is affected by a cross-site scripting vulnerability. The\ndatabase name is not properly sanitized in the file\n'js/db_operations.js' when attempting to rename a database.\n\nNote that this version is reportedly affected by several other cross-\nsite scripting vulnerabilities. However, Nessus has not tested for\nthese vulnerabilities.\");\n\n script_set_attribute(attribute:\"see_also\", value:\"http://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php\");\n script_set_attribute(attribute:\"solution\", value:\n\"Either apply the vendor patches or upgrade to phpMyAdmin version\n3.4.8 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/12/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/19\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:phpmyadmin:phpmyadmin\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses : XSS\");\n\n script_copyright(english:\"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"phpMyAdmin_detect.nasl\");\n script_exclude_keys(\"Settings/disable_cgi_scanning\");\n script_require_ports(\"Services/www\", 80);\n script_require_keys(\"www/phpMyAdmin\", \"www/PHP\");\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\ninclude(\"webapp_func.inc\");\n\n\nport = get_http_port(default:80, php:TRUE);\n\ninstall = get_install_from_kb(appname:\"phpMyAdmin\", port:port, exit_on_fail:TRUE);\ndir = install['dir'];\nrequest_url = '/js/db_operations.js';\n\nres = http_send_recv3(\n port : port,\n method : \"GET\",\n item : dir + request_url,\n exit_on_fail : TRUE\n);\n\n# Affects 3.4.x < 3.4.8\nif (\n 'var d=\"CREATE DATABASE \"+$(\"#new_db_name\").val()+\" / DROP DATABASE' >< res[2] &&\n 'var d=escapeHtml(\"CREATE DATABASE \"+$(\"#new_db_name\").val()+\" / DROP DATABASE' >!< res[2]\n)\n{\n set_kb_item(name:'www/'+port+'/XSS', value:TRUE);\n if (report_verbosity > 0)\n {\n report = get_vuln_report(items:dir + request_url, port:port);\n security_warning(port:port, extra:report);\n }\n else security_warning(port);\n exit(0);\n}\nelse exit(0, \"The phpMyAdmin install at \"+build_url(port:port,qs:dir)+\" is not affected.\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-07T10:51:19", "description": "The phpMyAdmin development team reports :\n\nUsing crafted database names, it was possible to produce XSS in the\nDatabase Synchronize and Database rename panels. Using an invalid and\ncrafted SQL query, it was possible to produce XSS when editing a query\non a table overview panel or when using the view creation dialog.\nUsing a crafted column type, it was possible to produce XSS in the\ntable search and create index dialogs.", "edition": 25, "published": "2011-12-02T00:00:00", "title": "FreeBSD : phpMyAdmin -- Multiple XSS (ed536336-1c57-11e1-86f4-e0cb4e266481)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4634"], "modified": "2011-12-02T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:phpMyAdmin"], "id": "FREEBSD_PKG_ED5363361C5711E186F4E0CB4E266481.NASL", "href": "https://www.tenable.com/plugins/nessus/56988", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(56988);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2011-4634\");\n\n script_name(english:\"FreeBSD : phpMyAdmin -- Multiple XSS (ed536336-1c57-11e1-86f4-e0cb4e266481)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The phpMyAdmin development team reports :\n\nUsing crafted database names, it was possible to produce XSS in the\nDatabase Synchronize and Database rename panels. Using an invalid and\ncrafted SQL query, it was possible to produce XSS when editing a query\non a table overview panel or when using the view creation dialog.\nUsing a crafted column type, it was possible to produce XSS in the\ntable search and create index dialogs.\"\n );\n # http://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-18/\"\n );\n # https://vuxml.freebsd.org/freebsd/ed536336-1c57-11e1-86f4-e0cb4e266481.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1bcc2f60\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:phpMyAdmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/11/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"phpMyAdmin>3.4<3.4.8.r1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-12T10:09:22", "description": "Changes for 3.4.8.0 (2011-12-01) :\n\n - [interface] enum data split at space char (more space to\n edit)\n\n - [interface] ENUM/SET editor can't handle commas in\n values\n\n - [interface] no links to browse/empty views and tables\n\n - [interface] Deleted search results remain visible\n\n - [import] ODS import ignores memory limits\n\n - [interface] Visual column separation\n\n - [parser] TRUE not recognized by parser\n\n - [config] Make location of php-gettext configurable\n\n - [import] Handle conflicts in some open_basedir\n situations\n\n - [display] Dropdown results - setting NULL does not\n work\n\n - [edit] Inline edit on multi-server configuration\n\n - [core] Notice: Array to string conversion in PHP 5.4\n\n - [interface] When ShowTooltipAliasTB is true, VIEW is\n wrongly shown as the view name in main panel db\n Structure page\n\n - [core] Fail to synchronize column with name of keyword\n\n - [interface] Add column after drop\n\n - [interface] Avoid showing the password in phpinfo()'s\n output\n\n - [GUI] 'newer version of phpMyAdmin' message not shown\n in IE8\n\n - [interface] Entering the key through a lookup window\n does not reset NULL\n\n - [security] Self-XSS on database names (synchronize,\n operations/rename), see PMASA-2011-18\n (http://www.phpmyadmin.net/home_page/security/PMASA-20\n 11-18.php)\n\n - [security] Self-XSS on column type (create index,\n table Search), see PMASA-2011-18\n (http://www.phpmyadmin.net/home_page/security/PMASA-20\n 11-18.php)\n\n - [security] Self-XSS on invalid query (table overview),\n see PMASA-2011-18\n (http://www.phpmyadmin.net/home_page/security/PMASA-20\n 11-18.php)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 25, "published": "2011-12-19T00:00:00", "title": "Fedora 15 : phpMyAdmin-3.4.8-1.fc15 (2011-16786)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4634"], "modified": "2011-12-19T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:15", "p-cpe:/a:fedoraproject:fedora:phpMyAdmin"], "id": "FEDORA_2011-16786.NASL", "href": "https://www.tenable.com/plugins/nessus/57327", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2011-16786.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(57327);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2011-4634\");\n script_xref(name:\"FEDORA\", value:\"2011-16786\");\n\n script_name(english:\"Fedora 15 : phpMyAdmin-3.4.8-1.fc15 (2011-16786)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Changes for 3.4.8.0 (2011-12-01) :\n\n - [interface] enum data split at space char (more space to\n edit)\n\n - [interface] ENUM/SET editor can't handle commas in\n values\n\n - [interface] no links to browse/empty views and tables\n\n - [interface] Deleted search results remain visible\n\n - [import] ODS import ignores memory limits\n\n - [interface] Visual column separation\n\n - [parser] TRUE not recognized by parser\n\n - [config] Make location of php-gettext configurable\n\n - [import] Handle conflicts in some open_basedir\n situations\n\n - [display] Dropdown results - setting NULL does not\n work\n\n - [edit] Inline edit on multi-server configuration\n\n - [core] Notice: Array to string conversion in PHP 5.4\n\n - [interface] When ShowTooltipAliasTB is true, VIEW is\n wrongly shown as the view name in main panel db\n Structure page\n\n - [core] Fail to synchronize column with name of keyword\n\n - [interface] Add column after drop\n\n - [interface] Avoid showing the password in phpinfo()'s\n output\n\n - [GUI] 'newer version of phpMyAdmin' message not shown\n in IE8\n\n - [interface] Entering the key through a lookup window\n does not reset NULL\n\n - [security] Self-XSS on database names (synchronize,\n operations/rename), see PMASA-2011-18\n (http://www.phpmyadmin.net/home_page/security/PMASA-20\n 11-18.php)\n\n - [security] Self-XSS on column type (create index,\n table Search), see PMASA-2011-18\n (http://www.phpmyadmin.net/home_page/security/PMASA-20\n 11-18.php)\n\n - [security] Self-XSS on invalid query (table overview),\n see PMASA-2011-18\n (http://www.phpmyadmin.net/home_page/security/PMASA-20\n 11-18.php)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-18/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=767666\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071019.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?52702558\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected phpMyAdmin package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:phpMyAdmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:15\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/19\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^15([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 15.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC15\", reference:\"phpMyAdmin-3.4.8-1.fc15\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"phpMyAdmin\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-12T10:09:22", "description": "Changes for 3.4.8.0 (2011-12-01) :\n\n - [interface] enum data split at space char (more space to\n edit)\n\n - [interface] ENUM/SET editor can't handle commas in\n values\n\n - [interface] no links to browse/empty views and tables\n\n - [interface] Deleted search results remain visible\n\n - [import] ODS import ignores memory limits\n\n - [interface] Visual column separation\n\n - [parser] TRUE not recognized by parser\n\n - [config] Make location of php-gettext configurable\n\n - [import] Handle conflicts in some open_basedir\n situations\n\n - [display] Dropdown results - setting NULL does not\n work\n\n - [edit] Inline edit on multi-server configuration\n\n - [core] Notice: Array to string conversion in PHP 5.4\n\n - [interface] When ShowTooltipAliasTB is true, VIEW is\n wrongly shown as the view name in main panel db\n Structure page\n\n - [core] Fail to synchronize column with name of keyword\n\n - [interface] Add column after drop\n\n - [interface] Avoid showing the password in phpinfo()'s\n output\n\n - [GUI] 'newer version of phpMyAdmin' message not shown\n in IE8\n\n - [interface] Entering the key through a lookup window\n does not reset NULL\n\n - [security] Self-XSS on database names (synchronize,\n operations/rename), see PMASA-2011-18\n (http://www.phpmyadmin.net/home_page/security/PMASA-20\n 11-18.php)\n\n - [security] Self-XSS on column type (create index,\n table Search), see PMASA-2011-18\n (http://www.phpmyadmin.net/home_page/security/PMASA-20\n 11-18.php)\n\n - [security] Self-XSS on invalid query (table overview),\n see PMASA-2011-18\n (http://www.phpmyadmin.net/home_page/security/PMASA-20\n 11-18.php)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 25, "published": "2011-12-19T00:00:00", "title": "Fedora 16 : phpMyAdmin-3.4.8-1.fc16 (2011-16768)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4634"], "modified": "2011-12-19T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:16", "p-cpe:/a:fedoraproject:fedora:phpMyAdmin"], "id": "FEDORA_2011-16768.NASL", "href": "https://www.tenable.com/plugins/nessus/57326", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2011-16768.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(57326);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2011-4634\");\n script_xref(name:\"FEDORA\", value:\"2011-16768\");\n\n script_name(english:\"Fedora 16 : phpMyAdmin-3.4.8-1.fc16 (2011-16768)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Changes for 3.4.8.0 (2011-12-01) :\n\n - [interface] enum data split at space char (more space to\n edit)\n\n - [interface] ENUM/SET editor can't handle commas in\n values\n\n - [interface] no links to browse/empty views and tables\n\n - [interface] Deleted search results remain visible\n\n - [import] ODS import ignores memory limits\n\n - [interface] Visual column separation\n\n - [parser] TRUE not recognized by parser\n\n - [config] Make location of php-gettext configurable\n\n - [import] Handle conflicts in some open_basedir\n situations\n\n - [display] Dropdown results - setting NULL does not\n work\n\n - [edit] Inline edit on multi-server configuration\n\n - [core] Notice: Array to string conversion in PHP 5.4\n\n - [interface] When ShowTooltipAliasTB is true, VIEW is\n wrongly shown as the view name in main panel db\n Structure page\n\n - [core] Fail to synchronize column with name of keyword\n\n - [interface] Add column after drop\n\n - [interface] Avoid showing the password in phpinfo()'s\n output\n\n - [GUI] 'newer version of phpMyAdmin' message not shown\n in IE8\n\n - [interface] Entering the key through a lookup window\n does not reset NULL\n\n - [security] Self-XSS on database names (synchronize,\n operations/rename), see PMASA-2011-18\n (http://www.phpmyadmin.net/home_page/security/PMASA-20\n 11-18.php)\n\n - [security] Self-XSS on column type (create index,\n table Search), see PMASA-2011-18\n (http://www.phpmyadmin.net/home_page/security/PMASA-20\n 11-18.php)\n\n - [security] Self-XSS on invalid query (table overview),\n see PMASA-2011-18\n (http://www.phpmyadmin.net/home_page/security/PMASA-20\n 11-18.php)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-18/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=767666\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071040.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f62869ef\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected phpMyAdmin package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:phpMyAdmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:16\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/19\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^16([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 16.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC16\", reference:\"phpMyAdmin-3.4.8-1.fc16\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"phpMyAdmin\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-17T12:07:54", "description": " - update to 3.4.8\n\n - bug #3425230 [interface] enum data split at space char\n (more space to edit)\n\n - bug #3426840 [interface] ENUM/SET editor can't handle\n commas in values\n\n - bug #3427256 [interface] no links to browse/empty views\n and tables\n\n - bug #3430377 [interface] Deleted search results remain\n visible\n\n - bug #3428627 [import] ODS import ignores memory limits\n\n - bug #3426836 [interface] Visual column separation\n\n - bug #3428065 [parser] TRUE not recognized by parser\n\n + patch #3433770 [config] Make location of php-gettext\n configurable\n\n - patch #3430291 [import] Handle conflicts in some\n open_basedir situations\n\n - bug #3431427 [display] Dropdown results - setting NULL\n does not work\n\n - patch #3428764 [edit] Inline edit on multi-server\n configuration\n\n - patch #3437354 [core] Notice: Array to string conversion\n in PHP 5.4\n\n - [interface] When ShowTooltipAliasTB is true, VIEW is\n wrongly shown as the view name in main panel db\n Structure page\n\n - bug #3439292 [core] Fail to synchronize column with name\n of keyword\n\n - bug #3425156 [interface] Add column after drop\n\n - [interface] Avoid showing the password in phpinfo()'s\n output\n\n - bug #3441572 [GUI] 'newer version of phpMyAdmin' message\n not shown in IE8\n\n - bug #3407235 [interface] Entering the key through a\n lookup window does not reset NULL\n\n - [security] Self-XSS on database names (Synchronize), see\n PMASA-2011-18\n\n - [security] Self-XSS on database names\n (Operations/rename), see PMASA-2011-18\n\n - [security] Self-XSS on column type (Create index), see\n PMASA-2011-18\n\n - [security] Self-XSS on column type (table Search), see\n PMASA-2011-18\n\n - [security] Self-XSS on invalid query (table overview),\n see PMASA-2011-18", "edition": 24, "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : phpMyAdmin (openSUSE-2011-94)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4634"], "modified": "2014-06-13T00:00:00", "cpe": ["cpe:/o:novell:opensuse:12.1", "p-cpe:/a:novell:opensuse:phpMyAdmin"], "id": "OPENSUSE-2011-94.NASL", "href": "https://www.tenable.com/plugins/nessus/74539", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2011-94.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(74539);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-4634\");\n\n script_name(english:\"openSUSE Security Update : phpMyAdmin (openSUSE-2011-94)\");\n script_summary(english:\"Check for the openSUSE-2011-94 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - update to 3.4.8\n\n - bug #3425230 [interface] enum data split at space char\n (more space to edit)\n\n - bug #3426840 [interface] ENUM/SET editor can't handle\n commas in values\n\n - bug #3427256 [interface] no links to browse/empty views\n and tables\n\n - bug #3430377 [interface] Deleted search results remain\n visible\n\n - bug #3428627 [import] ODS import ignores memory limits\n\n - bug #3426836 [interface] Visual column separation\n\n - bug #3428065 [parser] TRUE not recognized by parser\n\n + patch #3433770 [config] Make location of php-gettext\n configurable\n\n - patch #3430291 [import] Handle conflicts in some\n open_basedir situations\n\n - bug #3431427 [display] Dropdown results - setting NULL\n does not work\n\n - patch #3428764 [edit] Inline edit on multi-server\n configuration\n\n - patch #3437354 [core] Notice: Array to string conversion\n in PHP 5.4\n\n - [interface] When ShowTooltipAliasTB is true, VIEW is\n wrongly shown as the view name in main panel db\n Structure page\n\n - bug #3439292 [core] Fail to synchronize column with name\n of keyword\n\n - bug #3425156 [interface] Add column after drop\n\n - [interface] Avoid showing the password in phpinfo()'s\n output\n\n - bug #3441572 [GUI] 'newer version of phpMyAdmin' message\n not shown in IE8\n\n - bug #3407235 [interface] Entering the key through a\n lookup window does not reset NULL\n\n - [security] Self-XSS on database names (Synchronize), see\n PMASA-2011-18\n\n - [security] Self-XSS on database names\n (Operations/rename), see PMASA-2011-18\n\n - [security] Self-XSS on column type (Create index), see\n PMASA-2011-18\n\n - [security] Self-XSS on column type (table Search), see\n PMASA-2011-18\n\n - [security] Self-XSS on invalid query (table overview),\n see PMASA-2011-18\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=736772\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected phpMyAdmin package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:phpMyAdmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:12.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE12\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"12.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE12.1\", reference:\"phpMyAdmin-3.4.8-1.7.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"phpMyAdmin\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-07T10:53:07", "description": "The remote host is affected by the vulnerability described in GLSA-201201-01\n(phpMyAdmin: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in phpMyAdmin. Please\n review the CVE identifiers and phpMyAdmin Security Advisories referenced\n below for details.\n \nImpact :\n\n Remote attackers might be able to insert and execute PHP code, include\n and execute local PHP files, or perform Cross-Site Scripting (XSS)\n attacks via various vectors.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 26, "published": "2012-01-05T00:00:00", "title": "GLSA-201201-01 : phpMyAdmin: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-7252", "CVE-2010-3055", "CVE-2011-0987", "CVE-2011-2508", "CVE-2011-2642", "CVE-2011-2505", "CVE-2010-3056", "CVE-2010-2958", "CVE-2011-4634", "CVE-2011-2718", "CVE-2011-4107", "CVE-2011-2643", "CVE-2011-2506", "CVE-2011-4782", "CVE-2011-2719", "CVE-2011-3646", "CVE-2011-2507", "CVE-2008-7251", "CVE-2011-4780", "CVE-2011-0986", "CVE-2010-3263", "CVE-2011-4064"], "modified": "2012-01-05T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:phpmyadmin"], "id": "GENTOO_GLSA-201201-01.NASL", "href": "https://www.tenable.com/plugins/nessus/57433", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201201-01.\n#\n# The advisory text is Copyright (C) 2001-2019 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(57433);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2008-7251\", \"CVE-2008-7252\", \"CVE-2010-2958\", \"CVE-2010-3055\", \"CVE-2010-3056\", \"CVE-2010-3263\", \"CVE-2011-0986\", \"CVE-2011-0987\", \"CVE-2011-2505\", \"CVE-2011-2506\", \"CVE-2011-2507\", \"CVE-2011-2508\", \"CVE-2011-2642\", \"CVE-2011-2643\", \"CVE-2011-2718\", \"CVE-2011-2719\", \"CVE-2011-3646\", \"CVE-2011-4064\", \"CVE-2011-4107\", \"CVE-2011-4634\", \"CVE-2011-4780\", \"CVE-2011-4782\");\n script_bugtraq_id(37826, 42584, 42591, 42874, 46359, 48563, 48874, 50175, 50497, 51099, 51166, 51226);\n script_xref(name:\"GLSA\", value:\"201201-01\");\n script_xref(name:\"TRA\", value:\"TRA-2010-02\");\n\n script_name(english:\"GLSA-201201-01 : phpMyAdmin: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201201-01\n(phpMyAdmin: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in phpMyAdmin. Please\n review the CVE identifiers and phpMyAdmin Security Advisories referenced\n below for details.\n \nImpact :\n\n Remote attackers might be able to insert and execute PHP code, include\n and execute local PHP files, or perform Cross-Site Scripting (XSS)\n attacks via various vectors.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2010-1.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2010-1/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2010-2.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2010-2/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2010-4.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2010-4/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2010-5.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2010-5/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2010-6.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2010-6/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2010-7.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2010-7/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2011-1.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-1/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2011-10.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-10/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2011-11.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-11/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2011-12.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-12/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2011-15.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-15/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2011-16.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-16/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2011-17.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-17/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-18/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2011-19.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-19/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2011-2.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-2/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2011-20.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-20/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2011-5.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-5/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2011-6.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-6/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2011-7.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-7/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2011-8.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-8/\"\n );\n # https://www.phpmyadmin.net/home_page/security/PMASA-2011-9.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.phpmyadmin.net/security/PMASA-2011-9/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201201-01\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.tenable.com/security/research/tra-2010-02\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All phpMyAdmin users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=dev-db/phpmyadmin-3.4.9'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"d2_elliot_name\", value:\"Phpmyadmin 3.x RCE\");\n script_set_attribute(attribute:\"exploit_framework_d2_elliot\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:phpmyadmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/01/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/01/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/01/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"dev-db/phpmyadmin\", unaffected:make_list(\"ge 3.4.9\"), vulnerable:make_list(\"lt 3.4.9\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"phpMyAdmin\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "freebsd": [{"lastseen": "2019-05-29T18:33:55", "bulletinFamily": "unix", "cvelist": ["CVE-2011-4634"], "description": "\nThe phpMyAdmin development team reports:\n\nUsing crafted database names, it was possible to produce XSS\n\t in the Database Synchronize and Database rename panels. Using\n\t an invalid and crafted SQL query, it was possible to produce\n\t XSS when editing a query on a table overview panel or when\n\t using the view creation dialog. Using a crafted column type,\n\t it was possible to produce XSS in the table search and create\n\t index dialogs.\n\n", "edition": 4, "modified": "2011-11-24T00:00:00", "published": "2011-11-24T00:00:00", "id": "ED536336-1C57-11E1-86F4-E0CB4E266481", "href": "https://vuxml.freebsd.org/freebsd/ed536336-1c57-11e1-86f4-e0cb4e266481.html", "title": "phpMyAdmin -- Multiple XSS", "type": "freebsd", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "phpmyadmin": [{"lastseen": "2019-05-29T17:20:09", "bulletinFamily": "software", "cvelist": ["CVE-2011-4634"], "description": "## PMASA-2011-18\n\n**Announcement-ID:** PMASA-2011-18\n\n**Date:** 2011-12-01\n\n**Updated:** 2011-12-03\n\n### Summary\n\nMultiple XSS.\n\n### Description\n\nUsing crafted database names, it was possible to produce XSS in the Database Synchronize and Database rename panels. Using an invalid and crafted SQL query, it was possible to produce XSS when editing a query on a table overview panel or when using the view creation dialog. Using a crafted column type, it was possible to produce XSS in the table search and create index dialogs.\n\n### Severity\n\nWe consider these vulnerabilities to be non critical.\n\n### Mitigation factor\n\nThese attacks are unlikely to succeed on a victim. Moreover, all these attacks require that the user be already logged in and that a valid token be part of the request.\n\n### Affected Versions\n\nVersions 3.4.x are affected.\n\n### Solution\n\nUpgrade to phpMyAdmin 3.4.8 or newer or apply the related patch listed below.\n\n### References\n\nThanks to [David Vieira-Kurz](<http://www.majorsecurity.net>) for reporting the Database Synchronize and rename issues. Thanks to Maxim Rupp for reporting the invalid SQL query issue. Thanks to [R.Harikrishnan](<http://www.defcontn.com>) for reporting the database rename and view creation issues.\n\nAssigned CVE ids: [CVE-2011-4634](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4634>)\n\nCWE ids: [CWE-661](<https://cwe.mitre.org/data/definitions/661.html>) [CWE-79](<https://cwe.mitre.org/data/definitions/79.html>)\n\n### Patches\n\nThe following commits have been made to fix this issue:\n\n * [1490533d91e9d3820e78ca4eac7981886eaea2cb](<https://github.com/phpmyadmin/phpmyadmin/commit/1490533d91e9d3820e78ca4eac7981886eaea2cb>)\n * [b289fe082441dc739939b0ba15dae0d9dc6cee92](<https://github.com/phpmyadmin/phpmyadmin/commit/b289fe082441dc739939b0ba15dae0d9dc6cee92>)\n * [dac8d6ce256333ff45b5f46270304b8657452740](<https://github.com/phpmyadmin/phpmyadmin/commit/dac8d6ce256333ff45b5f46270304b8657452740>)\n * [077c10020e349e8c1beb46309098992fde616913](<https://github.com/phpmyadmin/phpmyadmin/commit/077c10020e349e8c1beb46309098992fde616913>)\n\n### More information\n\nFor further information and in case of questions, please contact the phpMyAdmin team. Our website is [ phpmyadmin.net](<https://www.phpmyadmin.net/>). \n", "edition": 2, "modified": "2011-12-03T00:00:00", "published": "2011-12-01T00:00:00", "id": "PHPMYADMIN:PMASA-2011-18", "href": "https://www.phpmyadmin.net/security/PMASA-2011-18/", "title": "Multiple XSS.", "type": "phpmyadmin", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:45", "bulletinFamily": "unix", "cvelist": ["CVE-2008-7252", "CVE-2010-3055", "CVE-2011-0987", "CVE-2011-2508", "CVE-2011-2642", "CVE-2011-2505", "CVE-2010-3056", "CVE-2010-2958", "CVE-2011-4634", "CVE-2011-2718", "CVE-2011-4107", "CVE-2011-2643", "CVE-2011-2506", "CVE-2011-4782", "CVE-2011-2719", "CVE-2011-3646", "CVE-2011-2507", "CVE-2008-7251", "CVE-2011-4780", "CVE-2011-0986", "CVE-2010-3263", "CVE-2011-4064"], "edition": 1, "description": "### Background\n\nphpMyAdmin is a web-based management tool for MySQL databases. \n\n### Description\n\nMultiple vulnerabilities have been discovered in phpMyAdmin. Please review the CVE identifiers and phpMyAdmin Security Advisories referenced below for details. \n\n### Impact\n\nRemote attackers might be able to insert and execute PHP code, include and execute local PHP files, or perform Cross-Site Scripting (XSS) attacks via various vectors. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll phpMyAdmin users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-db/phpmyadmin-3.4.9\"", "modified": "2012-01-04T00:00:00", "published": "2012-01-04T00:00:00", "id": "GLSA-201201-01", "href": "https://security.gentoo.org/glsa/201201-01", "type": "gentoo", "title": "phpMyAdmin: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}