PHPMyAdmin SQL.PHP跨站脚本攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109182 漏洞类型 跨站脚本
发布时间 2005-10-31 更新时间 2006-04-28
CVE编号 CVE-2006-1803 CNNVD-ID CNNVD-200604-277
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/27632
https://www.securityfocus.com/bid/17487
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200604-277
|漏洞详情
phpMyAdmin2.7.0-pl1中的sql.php存在跨站脚本攻击漏洞。这使得远程攻击者可以借助于sql_query参数注入任意Web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/17487/info

PHPMyAdmin is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. 

An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

http://www.example.com//phpmyadmin/sql.php?lang=de-utf-8&server=1&collation_connection=utf8_general_ci&db=fu&table=fu&goto=tbl_properties_structure.php&back=tbl_properties_structure.php&sql
_query=SELECT+*+FROM+%60'%3Cscript%3Ealert(document.cookie)%3C/script%3E'%60
|受影响的产品
S.u.S.E. Linux Professional 10.0 OSS S.u.S.E. Linux Professional 10.0 S.u.S.E. Linux Professional 9.3 x86_64 S.u.S.E. Linux Professional 9.3 S.u.S.E. Linux Professional 9.2 x86_64
|参考资料

来源:BID
名称:17487
链接:http://www.securityfocus.com/bid/17487
来源:BUGTRAQ
名称:20060414Re:phpMyAdmin2.7.0-pl1
链接:http://www.securityfocus.com/archive/1/archive/1/431013/100/0/threaded
来源:BUGTRAQ
名称:20060412phpMyAdmin2.7.0-pl1
链接:http://www.securityfocus.com/archive/1/archive/1/430902/100/0/threaded
来源:VUPEN
名称:ADV-2006-1372
链接:http://www.frsirt.com/english/advisories/2006/1372
来源:SECUNIA
名称:19659
链接:http://secunia.com/advisories/19659
来源:XF
名称:phpmyadmin-sql-xss(25796)
链接:http://xforce.iss.net/xforce/xfdb/25796
来源:SUSE
名称:SUSE-SR:2006:009
链接:http://www.novell.com/linux/security/advisories/2006_04_28.html
来源:SECUNIA
名称:19897
链接:http://secunia.com/advisories/19897