Cross-site Scripting (XSS) Affecting phpmyadmin package, versions <4:3.3.7-3
Threat Intelligence
EPSS
1.61% (88th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN8-PHPMYADMIN-418091
- published 8 Dec 2010
- disclosed 8 Dec 2010
How to fix?
Upgrade Debian:8 phpmyadmin to version 4:3.3.7-3 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream phpmyadmin package and not the phpmyadmin package as distributed by Debian.
See How to fix? for Debian:8 relevant fixed versions and status.
error.php in PhpMyAdmin 3.3.8.1, and other versions before 3.4.0-beta1, allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted BBcode tag containing "@" characters, as demonstrated using "[a@url@page]".
References
- https://security-tracker.debian.org/tracker/CVE-2010-4480
- http://www.debian.org/security/2010/dsa-2139
- http://www.exploit-db.com/exploits/15699
- http://www.phpmyadmin.net/home_page/security/PMASA-2010-9.php
- http://www.vupen.com/english/advisories/2010/3133
- http://www.vupen.com/english/advisories/2011/0001
- http://www.vupen.com/english/advisories/2011/0027
- http://secunia.com/advisories/42485
- http://secunia.com/advisories/42725
- http://www.securityfocus.com/bid/45633
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:000
CVSS Scores
version 3.1