diff options
-rw-r--r-- | security/vuxml/vuln.xml | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 9875e909b85e..650c4ff2add1 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,35 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="9b7053fd-3ab5-11da-9484-00123ffe8333"> + <topic>phpmyadmin -- Local file inclusion vulnerability</topic> + <affects> + <package> + <name>phpmyadmin</name> + <range><ge>2.6.4.r1</ge><le>2.6.4.1</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>PMASA-2005-4:</p> + <blockquote cite="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-4"> + <p>In libraries/grab_globals.lib.php, the $__redirect parameter was not + correctly validated, opening the door to a local file inclusion attack.</p> + <p>We consider this vulnerability to be serious. However, it can be exploited + only on systems not running in PHP safe mode (unless a deliberate hole was + opened by including in open_basedir some paths containing sensitive data).</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-4</url> + </references> + <dates> + <discovery>2005-10-11</discovery> + <entry>2005-10-11</entry> + </dates> + </vuln> + <vuln vid="d2b80c7c-3aae-11da-9484-00123ffe8333"> <topic>zope28 -- expose RestructuredText functionalies to untrusted users</topic> <affects> |