MGASA-2014-0495

Source
https://advisories.mageia.org/MGASA-2014-0495.html
Import Source
https://advisories.mageia.org/MGASA-2014-0495.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0495
Related
Published
2014-11-26T17:29:06Z
Modified
2014-11-26T17:12:15Z
Summary
Updated phpmyadmin packages fix security vulnerabilities
Details

Updated phpmyadmin package fixes security vulnerabilities:

In phpMyAdmin before 4.1.14.7, with a crafted database, table or column name it is possible to trigger an XSS attack in the table browse page, with a crafted ENUM value it is possible to trigger XSS attacks in the table print view and zoom search pages, and with a crafted value for font size it is possible to trigger an XSS attack in the home page (CVE-2014-8958).

In phpMyAdmin before 4.1.14.7, in the GIS editor feature, a parameter specifying the geometry type was not correcly validated, opening the door to a local file inclusion attack (CVE-2014-8959).

In phpMyAdmin before 4.1.14.7, with a crafted file name it is possible to trigger an XSS in the error reporting page (CVE-2014-8960).

In phpMyAdmin before 4.1.14.7, in the error reporting feature, a parameter specifying the file was not correctly validated, allowing the attacker to derive the line count of an arbitrary file (CVE-2014-8961).

References
Credits

Affected packages

Mageia:3 / phpmyadmin

Package

Name
phpmyadmin
Purl
pkg:rpm/mageia/phpmyadmin?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.14.7-1.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / phpmyadmin

Package

Name
phpmyadmin
Purl
pkg:rpm/mageia/phpmyadmin?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.14.7-1.mga4

Ecosystem specific

{
    "section": "core"
}