Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Several cross-site scripting vulnerabilities have been discovered in
phpmyadmin, a set of PHP-scripts to administrate MySQL over the WWW.
The Common Vulnerabilities and Exposures project identifies the
Andreas Kerber and Michal Cihar discovered several cross-site
scripting vulnerabilities in the error page and in the cookie
Stefan Esser discovered missing safety checks in grab_globals.php
that could permit a possible hacker to induce phpmyadmin to include an
arbitrary local file.
Tobias Klein discovered several cross-site scripting
vulnerabilities that could permit attackers to inject arbitrary
HTML or client-side scripting.
The version in the old stable distribution (woody) has probably its
own flaws and is not easily fixable without a full audit and patch
session. The easier way is to upgrade it from woody to sarge.
For the stable distribution (sarge) these problems have been fixed in
For the unstable distribution (sid) these problems have been fixed in
We recommend that you upgrade your phpmyadmin package.
Solution : http://www.debian.org/security/2005/dsa-880
Network Security Threat Level: High
Networks Security ID: 15169
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|USB Flash Card Reader Teac CA-200 Enhanced 19-1 Card Reader
|2pcs 4 in 1 Memory Multi Card Reader USB 2.0 for SD/TF/T-Flash/M2 Card BB
|SmallHD 2GB USB Flash Drive v.2 #ACC-STO-USB-2GB
|Kanguru Defender Elite Encrypted Flash Drive
No Discussions have been posted on this vulnerability.