oss-sec mailing list archives
Re: CVE Request -- phpPgAdmin -- Multiple XSS flaws fixed in v5.0.3
From: Josh Bressers <bressers () redhat com>
Date: Tue, 04 Oct 2011 14:50:19 -0400 (EDT)
Please use CVE-2011-3598 Thanks. -- JB ----- Original Message -----
Hello Josh, Steve, vendors, multiple cross-site scripting (XSS) flaws were reported in phpPgAdmin: 1) the 'title' argument of a particular web page was not sanitized properly prior displaying the page header, 2) the return ULR ('return_url') and return link name ('return_desc') were not sanitized properly prior displaying the requested page data. A remote attacker could provide a specially-crafted URL, which once visited by an unsuspecting phpPgAdmin user could lead to arbitrary HTML or web script execution. References: [1] https://secunia.com/advisories/46248/ [2] https://bugs.gentoo.org/show_bug.cgi?id=385505 [3] http://phppgadmin.sourceforge.net/doku.php?id=download [4] http://sourceforge.net/mailarchive/forum.php?thread_name=4E897F6C.90905%40free.fr&forum_name=phppgadmin-news [5] https://bugzilla.redhat.com/show_bug.cgi?id=743205 Upstream patch: [6] https://github.com/phppgadmin/phppgadmin/commit/1df248203de055f97e092b50b1dd9643ccb73842 Could you allocate a CVE id for this? Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Current thread:
- CVE Request -- phpPgAdmin -- Multiple XSS flaws fixed in v5.0.3 Jan Lieskovsky (Oct 04)
- Re: CVE Request -- phpPgAdmin -- Multiple XSS flaws fixed in v5.0.3 Josh Bressers (Oct 04)