PMASA-2016-11
Announcement-ID: PMASA-2016-11
Date: 2016-02-25
Summary
Multiple XSS vulnerabilities.
Description
By sending a specially crafted URL as part of the HOST header, it is possible to trigger an XSS attack.
A weakness was found that allows an XSS attack with Internet Explorer versions older than 8 and Safari on Windows using a specially crafted URL.
Using a crafted SQL query, it is possible to trigger an XSS attack through the SQL query page.
Using a crafted parameter value, it is possible to trigger an XSS attack in user accounts page.
Using a crafted parameter value, it is possible to trigger an XSS attack in zoom search page.
Severity
We consider this vulnerability to be non-critical.
Affected Versions
Versions 4.0.x (prior to 4.0.10.15), 4.4.x (prior to 4.4.15.5) and 4.5.x (prior to 4.5.5.1) are affected.
Solution
Upgrade to phpMyAdmin 4.0.10.15, 4.4.15.4, 4.5.5.1, or newer or apply patch listed below.
References
Thanks to Emanuel Bronshtein @e3amn2l for reporting these vulnerabilities.
Assigned CVE IDs: CVE-2016-2560
Patches
The following commits have been made on the 4.5 branch to fix this issue:
- 7877a9c0084bf8ae15cbd8d2729b126271f682cc
- 38fa1191049ac0c626a6684eea52068dfbbb5078
- c842a0de9288033d25404d1d6eb22dd83033675f
- ab1283e8366c97a155d4e9ae58628a248458ea32
- 41c4e0214c286f28830cca54423b5db57e7c0ce4
The following commits have been made on the 4.4 branch to fix this issue:
- 5168199f76c99f8c99b30e5142fa2c1a99ee5c35
- 9ec0b598bd0c5a5b63e483801057ab8a22e82527
- 081551c5890c8675c15e8507eac786a78b5cb790
- d0cdcf54a6a10a63cf882152a0a7430a967fa31e
- 07591a2b1b96ab0ee3fa6377972ed2d557af22ed
The following commits have been made on the 4.0 branch to fix this issue:
- b8f1e0f325f8f32bd82af64111d8c2e9055a363c
- 73c8245a3d1893a710447957e28dcfb18d9b47ad
- 0667ea8ac7519d7e642eade2686dc393d5faeae3
- 7ddce5e39a4e12cd351732955394bc7055c280eb
- fe3be9f4b9edd54dc39919e7dfeaaf4a67c1cf83
More information
For further information and in case of questions, please contact the phpMyAdmin security team at security@phpmyadmin.net.