vulnerability
phpMyAdmin: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CVE-2016-5705)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Jul 3, 2016 | Oct 16, 2019 | Nov 27, 2024 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Jul 3, 2016
Added
Oct 16, 2019
Modified
Nov 27, 2024
Description
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.4.x before 4.4.15.7 and 4.6.x before 4.6.3 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) server-privileges certificate data fields on the user privileges page, (2) an "invalid JSON" error message in the error console, (3) a database name in the central columns implementation, (4) a group name, or (5) a search name in the bookmarks implementation.
Solution
phpmyadmin-upgrade-latest
References
- CVE-2016-5705
- https://attackerkb.com/topics/CVE-2016-5705
- URL-http://lists.opensuse.org/opensuse-updates/2016-06/msg00113.html
- URL-http://lists.opensuse.org/opensuse-updates/2016-06/msg00114.html
- URL-http://www.debian.org/security/2016/dsa-3627
- URL-http://www.securityfocus.com/bid/91378
- URL-https://github.com/phpmyadmin/phpmyadmin/commit/03f73d48369703e0d3584699b08e24891c3295b8
- URL-https://github.com/phpmyadmin/phpmyadmin/commit/0b7416c5f4439ed3f11c023785f2d4c49a1b09fc
- URL-https://github.com/phpmyadmin/phpmyadmin/commit/364732e309cccb3fb56c938ed8d8bc0e04a3ca98
- URL-https://github.com/phpmyadmin/phpmyadmin/commit/36df83a97a7f140fdb008b727a94f882847c6a6f
- URL-https://github.com/phpmyadmin/phpmyadmin/commit/57ae483bad33059a885366d5445b7e1f6f29860a
- URL-https://security.gentoo.org/glsa/201701-32
- URL-https://www.phpmyadmin.net/security/PMASA-2016-21/

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.