PMASA-2010-5
Announcement-ID: PMASA-2010-5
Date: 2010-08-20
Summary
Several XSS vulnerabilities were found in the code.
Description
It was possible to conduct a XSS attack using crafted URLs or POST parameters on several pages.
Severity
We consider this vulnerability to be serious.
Mitigation factor
If the auth_type directive is set to 'config' and the directory is not protected, these attacks are more likely to succeed; otherwise, an attacker would need to obtain a valid token via another flaw on the server to be able to exploit these vulnerabilities.
Affected Versions
For 2.11.x: versions before 2.11.10.1 are affected.<br /> For 3.x: versions before 3.3.5.1 are affected.
Solution
Upgrade to phpMyAdmin 3.3.5.1 or 2.11.10.1 or newer or apply patch listed below.
References
Thanks to Aung Khant from YGN Ethical Hacker Group, Myanmar for reporting this issue. See their advisory for more details. After this report the team did audit the code as well and discovered more issues which are fixed as well.
Assigned CVE IDs: CVE-2010-3056
Patches
The following commits have been made to fix this issue:
- 48e909660032ddcbc13172830761e363e7a64d72
- be0f47a93141e2950ad400b8d22a2a98512825c2
- cd205cc55a46e3dc0f8883966f5c854f842e1000
- 7dc6cea06522b2d4af50934c983f3967540a4918
- 6028221d97efa2a7d56a61ab4c5750d1b2343619
- 2a1233b69ccc6c64819c2840ca5277c2dde0b9e0
- fa30188dde357426d339d0d7e29a3969f88d188a
- 00add5c43f594f80dab6304a5bb35d2e50540d2d
- c75e41d5d8cdd9bbc745c8cbe2c16998fda1de0c
- 533e10213590e7ccd83b98a5cd19ba1c3be119dd
- ea3b718fc379c15e773cc2f18ea4c8ccfa9af57b
- 7f266483b827fb05a4be11663003418c2ef1c878
- 5bcd95a42c8ba924d389eafee4d7be80bd4039a3
- 6d548f7d449b7d4b796949d10a503484f63eaf82
- d2e0e09e0d402555a6223f0b683fdbfa97821a63
- f273e6cbf6e2eea7367f7ef9c63c97ea55b92ca0
- bf60ec82e948450ae18b9e66c48d27da55ebe860
- 59b3b4916b31fa44f31b1e2d243ca7dda012ba37
The following commits have been made on the 2.11 branch to fix this issue:
- a7c004d8d4069ca3c7d1c221f37b9cab39e36aaf
- 8b7f07cd954221f276ab11e2c3d98f18deb2f551
- 1fe1aa6c0e2d85bed1343f4be21d672368e0a9c1
- 8b8ce64792bb981cefc37a19f29f28f112df1c16
- a4a54da173440d4c5097aececef56c28c14dc52e
- c69fca50ee81ff74cda860aad339d4185d32e194
- c910f4c9ec9af876675d96df3fa65d7fc4551cc6
- 08e27b89077df26a0f7f0390322bbe80e0437aa1
- 110c44a7a3117b94b065742606cc6f7bc05f8cd5
- 4951fd1c854d88e22935fd55d342fcb1670dc8e4
- 4a50055d52cb1d6ba125b743b0eb422d5549b9c9
- 0fd0512c9b7344abad60ab9effb7b7537b2b5d08
- 2051a861f8a968dafc297650036cc7e640a18887
- a88dbaf305a44107ffb557e9d93512792744af84
More information
For further information and in case of questions, please contact the phpMyAdmin security team at security@phpmyadmin.net.