FreeBSD : phpMyAdmin -- XSS vulnerabilities (fbb01289-2645-11e4-bc44-6805ca0b3d42)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The phpMyAdmin development team reports :

Multiple XSS vulnerabilities in browse table, ENUM editor, monitor,
query charts and table relations pages.

With a crafted database, table or a primary/unique key column name it
is possible to trigger an XSS when dropping a row from the table. With
a crafted column name it is possible to trigger an XSS in the ENUM
editor dialog. With a crafted variable name or a crafted value for
unit field it is possible to trigger a self-XSS when adding a new
chart in the monitor page. With a crafted value for x-axis label it is
possible to trigger a self-XSS in the query chart page. With a crafted
relation name it is possible to trigger an XSS in table relations
page.

XSS in view operations page.

With a crafted view name it is possible to trigger an XSS when
dropping the view in view operation page.

See also :

http://www.phpmyadmin.net/home_page/security/PMASA-2014-8.php
http://www.phpmyadmin.net/home_page/security/PMASA-2014-9.php
http://www.nessus.org/u?0a54435f

Solution :

Update the affected package.

Risk factor :

Low / CVSS Base Score : 3.5
(CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 77235 ()

Bugtraq ID:

CVE ID: CVE-2014-5273
CVE-2014-5274

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now