Cross-site scripting in phpMyAdmin - CVE-2016-2561
Published: March 1, 2016 / Updated: August 9, 2020
phpMyAdmin
Detailed vulnerability description
The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data when processing data passed via (1) normalization.php or (2) js/normalization.js in the database normalization page, (3) templates/database/structure/sortable_header.phtml in the database structure page, or (4) the pos parameter to db_central_columns.php in the central columns page. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
How to mitigate CVE-2016-2561
Sources
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178562.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178869.html
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00018.html
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00020.html
- http://www.debian.org/security/2016/dsa-3627
- https://github.com/phpmyadmin/phpmyadmin/commit/37c34d089aa19f30d11203bb0c7f85b486424372
- https://github.com/phpmyadmin/phpmyadmin/commit/746240bd13b62b5956fc34389cfbdc09e1e67775
- https://github.com/phpmyadmin/phpmyadmin/commit/983faa94f161df3623ecd371d3696a1b3f91c15f
- https://github.com/phpmyadmin/phpmyadmin/commit/bcd4ce8cba1272fca52f2331c08f2e3ac19cbbef
- https://github.com/phpmyadmin/phpmyadmin/commit/cc55f44a4a90147a007dee1aefa1cb529e23798b
- https://github.com/phpmyadmin/phpmyadmin/commit/f33a42f1da9db943a67bda7d29f7dd91957a8e7e
- https://www.phpmyadmin.net/security/PMASA-2016-12/