How to Buy
This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote web server hosts a PHP application that is affected by
multiple cross-site scripting vulnerabilities.
According to its self-identified version number, the phpMyAdmin
install hosted on the remote web server is affected by multiple
cross-site scripting vulnerabilities. Using a crafted table name, it's
possible to produce the issue with the following pages / conditions :
- The Database Structure page by creating a table with a
crafted name or using the Empty and Drop links of the
crafted table name.
- The Table Operations page of a crafted table by using
the 'Empty the table (TRUNCATE)' and 'Delete the table
- The Triggers page of a database containing tables with
a crafted name when opening the 'Add Trigger' pop-up.
- When creating a trigger for a table with a crafted name
with an invalid definition.
- When visualizing GIS data having a crafted label name.
Note that version 3.4.x is only affected by the issues on the Database
Structure page, while versions 3.5.x are affected by all the issues
See also :
Upgrade to phpMyAdmin 188.8.131.52 / 184.108.40.206 or later. Alternatively,
apply the patch referenced in the vendor security advisory.
Risk factor :
Low / CVSS Base Score : 3.5
CVSS Temporal Score : 3.0
Public Exploit Available : true
Family: CGI abuses : XSS
Nessus Plugin ID: 61659 ()
Bugtraq ID: 5506873624
CVE ID: CVE-2012-4345CVE-2012-4579
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.