FreeBSD : phpMyAdmin -- XSS due to unescaped HTML output in GIS visualisation page (7280c3f6-a99a-11e2-8cef-6805ca0b3d42)

Medium Nessus Plugin ID 66169


The remote FreeBSD host is missing a security-related update.


The phpMyAdmin development team reports :

When modifying a URL parameter with a crafted value it is possible to trigger an XSS.

These XSS can only be triggered when a valid database is known and when a valid cookie token is used.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 66169

File Name: freebsd_pkg_7280c3f6a99a11e28cef6805ca0b3d42.nasl

Version: $Revision: 1.3 $

Type: local

Published: 2013/04/22

Modified: 2016/10/19

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N


Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:phpMyAdmin, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2013/04/20

Vulnerability Publication Date: 2013/04/18

Reference Information

CVE: CVE-2013-1937