Vulnerabilities > CVE-2005-0992 - Unspecified vulnerability in PHPmyadmin
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Cross-site scripting (XSS) vulnerability in index.php in phpMyAdmin before 2.6.2-rc1 allows remote attackers to inject arbitrary web script or HTML via the convcharset parameter.
Vulnerable Configurations
Exploit-Db
description | PHPMyAdmin 2.x Convcharset Cross-Site Scripting Vulnerability. CVE-2005-0992. Webapps exploit for php platform |
id | EDB-ID:25330 |
last seen | 2016-02-03 |
modified | 2005-04-03 |
published | 2005-04-03 |
reporter | Oriol Torrent Santiago |
source | https://www.exploit-db.com/download/25330/ |
title | PHPMyAdmin 2.x Convcharset Cross-Site Scripting Vulnerability |
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200504-08.NASL description The remote host is affected by the vulnerability described in GLSA-200504-08 (phpMyAdmin: XSS vulnerability) Oriol Torrent Santiago has discovered that phpMyAdmin fails to validate input to the last seen 2020-06-01 modified 2020-06-02 plugin id 18013 published 2005-04-12 reporter This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/18013 title GLSA-200504-08 : phpMyAdmin: XSS vulnerability code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 200504-08. # # The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(18013); script_version("1.18"); script_cvs_date("Date: 2019/08/02 13:32:42"); script_cve_id("CVE-2005-0992"); script_xref(name:"GLSA", value:"200504-08"); script_name(english:"GLSA-200504-08 : phpMyAdmin: XSS vulnerability"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-200504-08 (phpMyAdmin: XSS vulnerability) Oriol Torrent Santiago has discovered that phpMyAdmin fails to validate input to the 'convcharset' variable, rendering it vulnerable to cross-site scripting attacks. Impact : By sending a specially crafted request, an attacker can inject and execute malicious script code, potentially compromising the victim's browser. Workaround : There is no known workaround at this time." ); # http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-3 script_set_attribute( attribute:"see_also", value:"https://www.phpmyadmin.net/security/PMASA-2005-3/" ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/200504-08" ); script_set_attribute( attribute:"solution", value: "All phpMyAdmin users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=dev-db/phpmyadmin-2.6.2_rc1'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:phpmyadmin"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2005/04/11"); script_set_attribute(attribute:"plugin_publication_date", value:"2005/04/12"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"dev-db/phpmyadmin", unaffected:make_list("ge 2.6.2_rc1"), vulnerable:make_list("lt 2.6.2_rc1"))) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get()); else security_warning(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "phpMyAdmin"); }
NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_58247A9601C811DABC080001020EED82.NASL description A phpMyAdmin security announcement reports : The convcharset parameter was not correctly validated, opening the door to a XSS attack. last seen 2020-06-01 modified 2020-06-02 plugin id 19343 published 2005-08-01 reporter This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/19343 title FreeBSD : phpmyadmin -- XSS vulnerability (58247a96-01c8-11da-bc08-0001020eed82) NASL family CGI abuses : XSS NASL id PHPMYADMIN_CONVCHARSET_XSS.NASL description The installed version of phpMyAdmin suffers from a cross-site scripting vulnerability due to its failure to sanitize user input to the last seen 2020-06-01 modified 2020-06-02 plugin id 17689 published 2005-04-05 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/17689 title phpMyAdmin index.php convcharset Parameter XSS
References
- http://www.arrelnet.com/advisories/adv20050403.html
- http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-3
- http://www.securityfocus.com/bid/12982
- http://secunia.com/advisories/14799
- http://www.gentoo.org/security/en/glsa/glsa-200504-08.xml
- http://marc.info/?l=bugtraq&m=111264361622660&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19940