aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--security/vuxml/vuln.xml29
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 9875e909b85e..650c4ff2add1 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,35 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="9b7053fd-3ab5-11da-9484-00123ffe8333">
+ <topic>phpmyadmin -- Local file inclusion vulnerability</topic>
+ <affects>
+ <package>
+ <name>phpmyadmin</name>
+ <range><ge>2.6.4.r1</ge><le>2.6.4.1</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>PMASA-2005-4:</p>
+ <blockquote cite="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-4">
+ <p>In libraries/grab_globals.lib.php, the $__redirect parameter was not
+ correctly validated, opening the door to a local file inclusion attack.</p>
+ <p>We consider this vulnerability to be serious. However, it can be exploited
+ only on systems not running in PHP safe mode (unless a deliberate hole was
+ opened by including in open_basedir some paths containing sensitive data).</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-4</url>
+ </references>
+ <dates>
+ <discovery>2005-10-11</discovery>
+ <entry>2005-10-11</entry>
+ </dates>
+ </vuln>
+
<vuln vid="d2b80c7c-3aae-11da-9484-00123ffe8333">
<topic>zope28 -- expose RestructuredText functionalies to untrusted users</topic>
<affects>