Self-XSS due to unescaped HTML output in database triggers page.
When navigating into the database triggers page, it is possible to trigger an XSS with a crafted trigger name.
We consider this vulnerability to be non critical.
This vulnerability can be triggered only by someone who is logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required page.
Versions 4.0.x (prior to 18.104.22.168), 4.1.x (prior to 22.214.171.124) and 4.2.x (prior to 4.2.6) are affected.
Upgrade to phpMyAdmin 126.96.36.199 or newer, or 188.8.131.52 or newer, or 4.2.6 or newer, or apply the patch listed below.
Thanks to Frans Rosén of detectify for reporting this vulnerability.
Assigned CVE ids: CVE-2014-4955
The following commits have been made to fix this issue:
The following commits have been made on the 4.0 branch to fix this issue:
The following commits have been made on the 4.1 branch to fix this issue:
For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.