[ASA-201802-11] phpmyadmin: cross-site scripting
Levente Polyak
anthraxx at archlinux.org
Sat Feb 24 00:44:25 UTC 2018
Arch Linux Security Advisory ASA-201802-11
==========================================
Severity: Medium
Date : 2018-02-23
CVE-ID : CVE-2018-7260
Package : phpmyadmin
Type : cross-site scripting
Remote : Yes
Link : https://security.archlinux.org/AVG-630
Summary
=======
The package phpmyadmin before version 4.7.8-1 is vulnerable to cross-
site scripting.
Resolution
==========
Upgrade to 4.7.8-1.
# pacman -Syu "phpmyadmin>=4.7.8-1"
The problem has been fixed upstream in version 4.7.8.
Workaround
==========
None.
Description
===========
Cross-site scripting (XSS) vulnerability in db_central_columns.php in
phpMyAdmin before 4.7.8 allows remote authenticated users to inject
arbitrary web script or HTML via a crafted URL.
Impact
======
A remote authenticated attacker is able to inject arbitrary javascript
via a crafted URL.
References
==========
https://udiniya.wordpress.com/2018/02/21/a-tale-of-stealing-session-cookie-in-phpmyadmin/
https://www.phpmyadmin.net/security/PMASA-2018-1/
https://github.com/phpmyadmin/phpmyadmin/commit/d2886a3e8745e8845633ae8a0054b5ee4d8babd5
https://security.archlinux.org/CVE-2018-7260
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 866 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20180224/92c34888/attachment.asc>
More information about the arch-security
mailing list