Lucene search

K
phpmyadminPhpMyAdminPHPMYADMIN:PMASA-2016-24
HistoryJun 23, 2016 - 12:00 a.m.

XSS through FPD

2016-06-2300:00:00
www.phpmyadmin.net
23
xss attack
openid authentication
html_errors
phpmyadmin
upgrade
patch
cve-2016-5731
cwe-661

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

7.8

Confidence

High

EPSS

0.002

Percentile

61.8%

PMASA-2016-24

Announcement-ID: PMASA-2016-24

Date: 2016-06-23

Summary

XSS through FPD

Description

With a specially crafted request, it is possible to trigger an XSS attack through the example OpenID authentication script.

Severity

We do not consider this vulnerability to be secure due to the non-standard required PHP setting for html_errors.

Mitigation factor

The attack requires html_errors = Off in php.ini, so it can be mitigated by setting html_errors = On. As an alternative mitigation means, the ./examples/openid.php file can be removed.

Affected Versions

All 4.6.x versions (prior to 4.6.3), 4.4.x versions (prior to 4.4.15.7), and 4.0.x versions (prior to 4.0.10.16) are affected

Solution

Upgrade to phpMyAdmin 4.6.3, 4.4.15.7, or 4.0.10.16 or newer or apply patch listed below.

References

Thanks to Emanuel Bronshtein @e3amn2l for reporting this vulnerability.

Assigned CVE ids: CVE-2016-5731

CWE ids: CWE-661

Patches

The following commits have been made on the 4.0 branch to fix this issue:

  • 5fefa51
  • 78f6c54

The following commits have been made on the 4.4 branch to fix this issue:

  • 52e7898
  • d005ba6

The following commits have been made on the 4.6 branch to fix this issue:

  • 94cf386
  • 418aeea

More information

For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.

Affected configurations

Vulners
Node
softwarephpmyadminRange≤4.6.3
VendorProductVersionCPE
softwarephpmyadmin*cpe:2.3:a:software:phpmyadmin:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

7.8

Confidence

High

EPSS

0.002

Percentile

61.8%