Self-XSS due to unescaped HTML output in database triggers page.
When navigating into the database triggers page, it is possible to trigger an XSS with a crafted trigger name.
We consider this vulnerability to be non critical.
This vulnerability can be triggered only by someone who is logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required page.
Versions 4.0.x (prior to 188.8.131.52), 4.1.x (prior to 184.108.40.206) and 4.2.x (prior to 4.2.6) are affected.
Upgrade to phpMyAdmin 220.127.116.11 or newer, or 18.104.22.168 or newer, or 4.2.6 or newer, or apply the patch listed below.
Thanks to Frans Rosén of detectify for reporting this vulnerability.
Assigned CVE ids: CVE-2014-4955
The following commits have been made to fix this issue:
The following commits have been made on the 4.0 branch to fix this issue:
The following commits have been made on the 4.1 branch to fix this issue:
For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.