blob: b17f7101be6ccec945cfb122c4f748c0ae8b83cd [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200504-08">
<title>phpMyAdmin: Cross-site scripting vulnerability</title>
phpMyAdmin is vulnerable to a cross-site scripting attack.
<product type="ebuild">phpMyAdmin</product>
<announced>April 11, 2005</announced>
<revised>May 22, 2006: 02</revised>
<package name="dev-db/phpmyadmin" auto="yes" arch="*">
<unaffected range="ge">2.6.2_rc1</unaffected>
<vulnerable range="lt">2.6.2_rc1</vulnerable>
phpMyAdmin is a tool written in PHP intended to handle the
administration of MySQL databases from a web-browser.
Oriol Torrent Santiago has discovered that phpMyAdmin fails to validate
input to the "convcharset" variable, rendering it vulnerable to
cross-site scripting attacks.
<impact type="low">
By sending a specially-crafted request, an attacker can inject and
execute malicious script code, potentially compromising the victim's
There is no known workaround at this time.
All phpMyAdmin users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.6.2_rc1&quot;</code>
<uri link="">PMASA-2005-3</uri>
<uri link="">CVE-2005-0992</uri>
<metadata tag="requester" timestamp="Sun, 10 Apr 2005 23:16:29 +0000">
<metadata tag="submitter" timestamp="Mon, 11 Apr 2005 00:34:48 +0000">
<metadata tag="bugReady" timestamp="Mon, 11 Apr 2005 00:35:39 +0000">