FreeBSD : phpMyAdmin -- Multiple XSS due to unescaped HTML output in Trigger, Procedure and Event pages and Fetching the version information from a non-SSL site is vulnerable to a MITM attack (ef417da3-1640-11e2-999b-e0cb4e266481)

medium Nessus Plugin ID 62539

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The phpMyAdmin development team reports :

When creating/modifying a trigger, event or procedure with a crafted name, it is possible to trigger an XSS.

To display information about the current phpMyAdmin version on the main page, a piece of JavaScript is fetched from the phpmyadmin.net website in non-SSL mode. A man-in-the-middle could modify this script on the wire to cause mischief.

Solution

Update the affected package.

See Also

https://www.phpmyadmin.net/security/PMASA-2012-6/

https://www.phpmyadmin.net/security/PMASA-2012-7/

http://www.nessus.org/u?37eb77ed

Plugin Details

Severity: Medium

ID: 62539

File Name: freebsd_pkg_ef417da3164011e2999be0cb4e266481.nasl

Version: 1.8

Type: local

Published: 10/15/2012

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:phpmyadmin, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 10/14/2012

Vulnerability Publication Date: 10/8/2012

Reference Information

CVE: CVE-2012-5339, CVE-2012-5368