Lucene search

K
phpmyadminPhpMyAdminPHPMYADMIN:PMASA-2013-8
HistoryJul 28, 2013 - 12:00 a.m.

XSS due to unescaped HTML Output when executing a SQL query.

2013-07-2800:00:00
www.phpmyadmin.net
15

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

37.1%

PMASA-2013-8

Announcement-ID: PMASA-2013-8

Date: 2013-07-28

Updated: 2013-07-30

Summary

XSS due to unescaped HTML Output when executing a SQL query.

Description

Using a crafted SQL query, it was possible to produce an XSS on the SQL query form.

Severity

We consider these vulnerabilities to be non critical.

Mitigation factor

This vulnerability can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required form.

Affected Versions

Versions 3.5.x (prior to 3.5.8.2) and 4.0.x (prior to 4.0.4.2) are affected.

Solution

Upgrade to phpMyAdmin 3.5.8.2 or 4.0.4.2 or newer or apply the patches listed below.

References

Thanks to MichaΕ‚ Bentkowski for reporting this issue.

Assigned CVE ids: CVE-2013-4995

CWE ids: CWE-661 CWE-79

Patches

The following commits have been made to fix this issue:

The following commits have been made on the 3.5 branch to fix this issue:

More information

For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.

CPENameOperatorVersion
phpmyadminle3.5.8.2
phpmyadminle4.0.4.2

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

37.1%