phpMyAdmin 4.1.6 Cross-site scripting (XSS)

2014.02.22
Credit: nijel
Risk: Low
Local: No
Remote: Yes
CWE: N/A


CVSS Base Score: 3.5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 6.8/10
Exploit range: Remote
Attack complexity: Medium
Authentication: Single time
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Cross-site scripting (XSS) vulnerability in import.php in phpMyAdmin before 4.1.7 allows remote authenticated users to inject arbitrary web script or HTML via a crafted filename in an import action. @@ -568,9 +568,9 @@ $message->addString($import_notice); } if (isset($local_import_file)) { - $message->addString('(' . $local_import_file . ')'); + $message->addString('(' . htmlspecialchars($local_import_file) . ')'); } else { - $message->addString('(' . $_FILES['import_file']['name'] . ')'); + $message->addString('(' . htmlspecialchars($_FILES['import_file']['name']) . ')'); } } }

References:

https://github.com/phpmyadmin/phpmyadmin/commit/968d5d5f486820bfa30af046f063b9f23304e14a
http://www.phpmyadmin.net/home_page/security/PMASA-2014-1.php


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top