PMASA-2013-9
Announcement-ID: PMASA-2013-9
Date: 2013-07-28
Updated: 2013-07-30
Summary
5 XSS vulnerabilities in setup, chart display, process list, and logo link.
Description
- In the setup/index.php, using a crafted # hash with a Javascript event, untrusted JS code could be executed.
- In the Display chart view, a chart title containing HTML code was rendered unescaped, leading to possible JavaScript code execution via events.
- A malicious user with permission to create databases or users having HTML tags in their name, could trigger an XSS vulnerability by issuing a sleep query with a long delay. In the server status monitor, the query parameters were shown unescaped.
- By configuring a malicious URL for the phpMyAdmin logo link in the navigation sidebar, untrusted script code could be executed when a user clicked the logo.
- The setup field for "List of trusted proxies for IP allow/deny" Ajax validation code returned the unescaped input on errors, leading to possible JavaScript execution by entering arbitrary HTML.
Severity
We consider these vulnerabilities to be non critical.
Mitigation factor
The stored XSS vulnerabilities can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required forms. The setup vulnerabilities can only be triggered when a crafted value is entered by the user.
Affected Versions
Versions 3.5.x (prior to 3.5.8.2) and 4.0.x (prior to 4.0.4.2) are affected.
Solution
Upgrade to phpMyAdmin 3.5.8.2 or 4.0.4.2 or newer or apply the patches listed below.
References
Thanks to Emanuel Bronshtein for reporting these issues.
Assigned CVE IDs: CVE-2013-4996 CVE-2013-4997
CWE IDs: CWE-661 CWE-79 CWE-80
Patches
The following commits have been made to fix this issue:
- 2005c4b7c15afa61a41e1087464fe12645f535e1
- d096a0fc46ef4708f3f4a440a8aba40163e3b72a
- e0d8568ac681073b09f10ad1c4d801df36290036
The following commits have been made on the 3.5 branch to fix this issue:
- 299c481a58386a846884720d90682ad4079edf3a
- 7f9d762e89157144fbcc01167a3141e39ac25da1
- 6f003b0ccb1293e5ff5be41bd25582485f480743
- 7c58ed002f570c3793df0a77a625d3177ee9a12e
- 845dae144f4ed665a14bf4912046d5d3d220ef96
More information
For further information and in case of questions, please contact the phpMyAdmin security team at security@phpmyadmin.net.