Summary: | dev-db/phpmyadmin HTTP Response Splitting vulnerability | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sune Kloppenborg Jeppesen (RETIRED) <jaervosz> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | web-apps |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-6 | ||
Whiteboard: | C4 [noglsa] jaervosz | ||
Package list: | Runtime testing required: | --- |
Description
Sune Kloppenborg Jeppesen (RETIRED)
2005-11-16 04:34:35 UTC
web-apps please bump. in cvs Arches please test and mark stable. sparc stable. stable for x86 stable on hppa stable on alpha Stable on ppc. amd64 done, last but not least ;) This one is ready for GLSA decision. I vote no. phpmyadmin isn't for me the best target for XSS or HTTP response splitting things, as it is typically restricted-access, Intranet-only. This one also requires register_globals=On... Voting NO and closing. |