aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authormatthew <matthew@FreeBSD.org>2014-07-21 05:47:42 +0800
committermatthew <matthew@FreeBSD.org>2014-07-21 05:47:42 +0800
commitbdfa2ade071076e70315168e4f580bb2f4f925b6 (patch)
tree48777e87a2a0e21ee4ea10ef864fa8970488d1de /security
parentd2560ca4cbcee993df49e50b20b59f73ba7c61d1 (diff)
downloadfreebsd-ports-gnome-bdfa2ade071076e70315168e4f580bb2f4f925b6.tar.gz
freebsd-ports-gnome-bdfa2ade071076e70315168e4f580bb2f4f925b6.tar.zst
freebsd-ports-gnome-bdfa2ade071076e70315168e4f580bb2f4f925b6.zip
Update the latest phpMyAdmin entry with CVE numbers and descriptive
text from the security advisories, now that they have been published. Security: 3f09ca29-0e48-11e4-b17a-6805ca0b3d42
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml27
1 files changed, 23 insertions, 4 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 327485dfba90..966a00647707 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -147,20 +147,38 @@ Notes:
<body xmlns="http://www.w3.org/1999/xhtml">
<p>The phpMyAdmin development team reports:</p>
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-4.php">
- <p>XSS injection due to unescaped table comment.</p>
+ <p>Self-XSS due to unescaped HTML output in database
+ structure page.</p>
+ <p>With a crafted table comment, it is possible to trigger
+ an XSS in database structure page.</p>
</blockquote>
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-5.php">
- <p>XSS injection due to unescaped table name (triggers).</p>
+ <p>Self-XSS due to unescaped HTML output in database
+ triggers page.</p>
+ <p>When navigating into the database triggers page, it is
+ possible to trigger an XSS with a crafted trigger
+ name.</p>
</blockquote>
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-6.php">
- <p>XSS in AJAX confirmation messages.</p>
+ <p>Multiple XSS in AJAX confirmation messages.</p>
+ <p>With a crafted column name it is possible to trigger an
+ XSS when dropping the column in table structure page. With
+ a crafted table name it is possible to trigger an XSS when
+ dropping or truncating the table in table operations
+ page.</p>
</blockquote>
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-7.php">
- <p>Missing validation for accessing User groups feature.</p>
+ <p>Access for an unprivileged user to MySQL user list.</p>
+ <p>An unpriviledged user could view the MySQL user list and
+ manipulate the tabs displayed in phpMyAdmin for them.</p>
</blockquote>
</body>
</description>
<references>
+ <cvename>CVE-2014-4954</cvename>
+ <cvename>CVE-2014-4955</cvename>
+ <cvename>CVE-2014-4986</cvename>
+ <cvename>CVE-2014-4987</cvename>
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-4.php</url>
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-5.php</url>
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-6.php</url>
@@ -169,6 +187,7 @@ Notes:
<dates>
<discovery>2014-07-18</discovery>
<entry>2014-07-18</entry>
+ <modified>2014-07-20</modified>
</dates>
</vuln>