Summary: | <dev-db/phppgadmin-5.0.4 : Functions Script Insertion Vulnerability (CVE-2012-1600) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | pgsql-bugs, web-apps |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://secunia.com/advisories/48574/ | ||
Whiteboard: | B4 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2012-04-03 16:04:30 UTC
Description A vulnerability has been reported in phpPgAdmin, which can be exploited by malicious users to conduct script insertion attacks. Certain unspecified input related to functions is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed. The vulnerability is reported in version 5.0.3. Prior versions may also be affected. Solution Update to version 5.0.4. *phppgadmin-5.0.4 (08 Jun 2012) 08 Jun 2012; Aaron W. Swenson <titanofold@gentoo.org> +phppgadmin-5.0.4.ebuild: Version bump. Arch teams, please test and mark stable: =dev-db/phppgadmin-5.0.4 Target KEYWORDS="amd64 hppa ppc x86" amd64 stable Stable for HPPA. x86 stable, thanks ppc stable, last arch. @security: please vote Thanks, folks. Closing noglsa for XSS. |