GHSA-xpxp-v33m-5jp9

Suggest an improvement
Source
https://github.com/advisories/GHSA-xpxp-v33m-5jp9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-xpxp-v33m-5jp9/GHSA-xpxp-v33m-5jp9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-xpxp-v33m-5jp9
Aliases
  • CVE-2012-5368
Published
2022-05-17T05:16:32Z
Modified
2023-11-08T03:57:08.318494Z
Summary
phpMyAdmin Unsafe Fetching of Javascript Code
Details

phpMyAdmin 3.5.x before 3.5.3 uses JavaScript code that is obtained through an HTTP session to phpmyadmin.net without SSL, which allows man-in-the-middle attackers to conduct cross-site scripting (XSS) attacks by modifying this code.

Database specific
{
    "nvd_published_at": "2012-10-25T10:51:00Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-08-15T23:42:53Z"
}
References

Affected packages

Packagist / phpmyadmin/phpmyadmin

Package

Name
phpmyadmin/phpmyadmin
Purl
pkg:composer/phpmyadmin/phpmyadmin

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.5
Fixed
3.5.3