Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Several cross-site scripting vulnerabilities have been discovered in
phpmyadmin, a set of PHP-scripts to administrate MySQL over the WWW.
The Common Vulnerabilities and Exposures project identifies the
Andreas Kerber and Michal Cihar discovered several cross-site
scripting vulnerabilities in the error page and in the cookie
Stefan Esser discovered missing safety checks in grab_globals.php
that could permit a possible hacker to induce phpmyadmin to include an
arbitrary local file.
Tobias Klein discovered several cross-site scripting
vulnerabilities that could permit attackers to inject arbitrary
HTML or client-side scripting.
The version in the old stable distribution (woody) has probably its
own flaws and is not easily fixable without a full audit and patch
session. The easier way is to upgrade it from woody to sarge.
For the stable distribution (sarge) these problems have been fixed in
For the unstable distribution (sid) these problems have been fixed in
We recommend that you upgrade your phpmyadmin package.
Solution : http://www.debian.org/security/2005/dsa-880
Network Security Threat Level: High
Networks Security ID: 15169
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|Brand New DELL 03H8HP 8 PORT SWITCH HUB + 0FG697 PE KVM Switch Expansion Module
|Cisco Catalyst 4500 Series 4507R-E Fan Tray Assembly Module WS-X4597-E
|Nortel Networks Baystack 5520-48T-PWR 48 Port Power Over Ethernet Network Switch
|CISCO SYSTEMS CATALYST 3560 Series POE-48 WS-C3560-48PS-S Network Switch
No Discussions have been posted on this vulnerability.