First published: Tue Oct 04 2011(Updated: )
Multiple cross-site scripting (XSS) flaws were reported in phpPgAdmin: 1) the 'title' argument of a particular web page was not sanitized properly prior displaying the page header, 2) the return ULR ('return_url') and return link name ('return_desc') were not sanitized properly prior displaying the requested page data. A remote attacker could provide a specially-crafted URL, which once visited by an unsuspecting phpPgAdmin user could lead to arbitrary HTML or web script execution. References: [1] <a href="https://secunia.com/advisories/46248/">https://secunia.com/advisories/46248/</a> [2] <a href="https://bugs.gentoo.org/show_bug.cgi?id=385505">https://bugs.gentoo.org/show_bug.cgi?id=385505</a> [3] <a href="http://phppgadmin.sourceforge.net/doku.php?id=download">http://phppgadmin.sourceforge.net/doku.php?id=download</a> [4] <a href="http://sourceforge.net/mailarchive/forum.php?thread_name=4E897F6C.90905%40free.fr&forum_name=phppgadmin-news">http://sourceforge.net/mailarchive/forum.php?thread_name=4E897F6C.90905%40free.fr&forum_name=phppgadmin-news</a> Upstream patch: [5] <a href="https://github.com/phppgadmin/phppgadmin/commit/1df248203de055f97e092b50b1dd9643ccb73842">https://github.com/phppgadmin/phppgadmin/commit/1df248203de055f97e092b50b1dd9643ccb73842</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
phpPgAdmin | <=5.0.2 | |
phpPgAdmin | =2.2 | |
phpPgAdmin | =2.2.1 | |
phpPgAdmin | =3.1 | |
phpPgAdmin | =3.2 | |
phpPgAdmin | =3.3 | |
phpPgAdmin | =3.4 | |
phpPgAdmin | =3.4.1 | |
phpPgAdmin | =3.5 | |
phpPgAdmin | =3.5.2 | |
phpPgAdmin | =3.5.3 | |
phpPgAdmin | =4.1.1 | |
phpPgAdmin | =4.2.1 | |
phpPgAdmin | =4.2.2 | |
phpPgAdmin | =4.2.3 | |
phpPgAdmin | =5.0.0 | |
phpPgAdmin | =5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3598 is classified as a medium severity vulnerability due to the presence of multiple cross-site scripting flaws.
To remediate CVE-2011-3598, you should upgrade to a patched version of phpPgAdmin that sanitizes user inputs properly.
CVE-2011-3598 can allow attackers to execute arbitrary JavaScript code in the context of a user's session, potentially leading to data theft.
CVE-2011-3598 affects phpPgAdmin versions up to 5.0.2 as well as several earlier versions.
It is unsafe to use phpPgAdmin without addressing CVE-2011-3598 as it exposes your application to cross-site scripting vulnerabilities.