Vulnerability Name:

CVE-2010-4329 (CCN-63500)

Assigned:2010-11-29
Published:2010-11-29
Updated:2011-01-28
Summary:Cross-site scripting (XSS) vulnerability in the PMA_linkOrButton function in libraries/common.lib.php in the database (db) search script in phpMyAdmin 2.11.x before 2.11.11.1 and 3.x before 3.3.8.1 allows remote attackers to inject arbitrary web script or HTML via a crafted request.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-79
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2010-4329

Source: FEDORA
Type: UNKNOWN
FEDORA-2010-18343

Source: FEDORA
Type: UNKNOWN
FEDORA-2010-18371

Source: CCN
Type: MSA-11-0001
Customised phpMyAdmin upgraded to 2.11.11.3 and 3.3.9.2

Source: CONFIRM
Type: Patch
http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commitdiff;h=4341818d73d454451f024950a4ce0141608ac7f8

Source: CONFIRM
Type: Patch
http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commitdiff;h=e1f4901ffc400b6d2df15eac0ba5015fe48a27c4

Source: CCN
Type: SA42408
phpMyAdmin Database Search Cross-Site Scripting Vulnerability

Source: SECUNIA
Type: Vendor Advisory
42408

Source: SECUNIA
Type: UNKNOWN
42477

Source: SECUNIA
Type: UNKNOWN
42725

Source: CCN
Type: SA43412
Moodle phpMyAdmin Module Multiple Vulnerabilities

Source: DEBIAN
Type: UNKNOWN
DSA-2139

Source: DEBIAN
Type: DSA-2139
phpmyadmin -- several vulnerabilities

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2010:244

Source: OSVDB
Type: UNKNOWN
69516

Source: CCN
Type: OSVDB ID: 69516
phpMyAdmin Database Search libraries/common.lib.php tag_params Parameter XSS

Source: CCN
Type: phpMyAdmin Web site
phpMyAdmin

Source: CCN
Type: PMASA-2010-8
XSS attack in database search

Source: CONFIRM
Type: Patch
http://www.phpmyadmin.net/home_page/security/PMASA-2010-8.php

Source: BID
Type: UNKNOWN
45100

Source: CCN
Type: BID-45100
phpMyAdmin Database Search Cross Site Scripting Vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2010-3082

Source: VUPEN
Type: UNKNOWN
ADV-2010-3087

Source: VUPEN
Type: UNKNOWN
ADV-2010-3158

Source: VUPEN
Type: UNKNOWN
ADV-2011-0001

Source: XF
Type: UNKNOWN
phpmyadmin-database-search-xss(63500)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:phpmyadmin:phpmyadmin:2.11.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.9.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.9.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.9.2:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.9.3:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.9.4:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.9.5:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.9.6:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.10.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.11:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.0.0:alpha:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.0.0:beta:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.0.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.0.1:rc1:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.0.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.1.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.1.1:rc1:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.1.2:rc1:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.1.3:rc1:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.1.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.1.4:rc2:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.1.5:rc1:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.2.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.2.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.2.1:rc1:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.2.2:rc1:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.3.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.3.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.3.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.3.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.3.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.3.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.3.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.3.7:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.3.8:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:phpmyadmin:phpmyadmin:3.3.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.11:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:3.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:phpmyadmin:phpmyadmin:2.11.10.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:20117
    P
    DSA-2139-1 phpmyadmin - several
    2014-06-23
    oval:com.ubuntu.precise:def:20104329000
    V
    CVE-2010-4329 on Ubuntu 12.04 LTS (precise) - medium.
    2010-12-02
    BACK
    phpmyadmin phpmyadmin 2.11.0
    phpmyadmin phpmyadmin 2.11.1.0
    phpmyadmin phpmyadmin 2.11.1.1
    phpmyadmin phpmyadmin 2.11.1.2
    phpmyadmin phpmyadmin 2.11.2.0
    phpmyadmin phpmyadmin 2.11.2.1
    phpmyadmin phpmyadmin 2.11.2.2
    phpmyadmin phpmyadmin 2.11.3.0
    phpmyadmin phpmyadmin 2.11.4.0
    phpmyadmin phpmyadmin 2.11.5.0
    phpmyadmin phpmyadmin 2.11.5.1
    phpmyadmin phpmyadmin 2.11.5.2
    phpmyadmin phpmyadmin 2.11.6.0
    phpmyadmin phpmyadmin 2.11.7.0
    phpmyadmin phpmyadmin 2.11.7.1
    phpmyadmin phpmyadmin 2.11.8.0
    phpmyadmin phpmyadmin 2.11.9.0
    phpmyadmin phpmyadmin 2.11.9.1
    phpmyadmin phpmyadmin 2.11.9.2
    phpmyadmin phpmyadmin 2.11.9.3
    phpmyadmin phpmyadmin 2.11.9.4
    phpmyadmin phpmyadmin 2.11.9.5
    phpmyadmin phpmyadmin 2.11.9.6
    phpmyadmin phpmyadmin 2.11.10.0
    phpmyadmin phpmyadmin 2.11.10.1
    phpmyadmin phpmyadmin 2.11.11
    phpmyadmin phpmyadmin 3.0.0
    phpmyadmin phpmyadmin 3.0.0 alpha
    phpmyadmin phpmyadmin 3.0.0 beta
    phpmyadmin phpmyadmin 3.0.0 rc1
    phpmyadmin phpmyadmin 3.0.1
    phpmyadmin phpmyadmin 3.0.1 rc1
    phpmyadmin phpmyadmin 3.0.1.1
    phpmyadmin phpmyadmin 3.1.0
    phpmyadmin phpmyadmin 3.1.0 beta1
    phpmyadmin phpmyadmin 3.1.1
    phpmyadmin phpmyadmin 3.1.1 rc1
    phpmyadmin phpmyadmin 3.1.2
    phpmyadmin phpmyadmin 3.1.2 rc1
    phpmyadmin phpmyadmin 3.1.3
    phpmyadmin phpmyadmin 3.1.3 rc1
    phpmyadmin phpmyadmin 3.1.3.1
    phpmyadmin phpmyadmin 3.1.3.2
    phpmyadmin phpmyadmin 3.1.4
    phpmyadmin phpmyadmin 3.1.4 rc2
    phpmyadmin phpmyadmin 3.1.5
    phpmyadmin phpmyadmin 3.1.5 rc1
    phpmyadmin phpmyadmin 3.2.0
    phpmyadmin phpmyadmin 3.2.0 beta1
    phpmyadmin phpmyadmin 3.2.0 rc1
    phpmyadmin phpmyadmin 3.2.1
    phpmyadmin phpmyadmin 3.2.1 rc1
    phpmyadmin phpmyadmin 3.2.2
    phpmyadmin phpmyadmin 3.2.2 rc1
    phpmyadmin phpmyadmin 3.3.0.0
    phpmyadmin phpmyadmin 3.3.1.0
    phpmyadmin phpmyadmin 3.3.2.0
    phpmyadmin phpmyadmin 3.3.3.0
    phpmyadmin phpmyadmin 3.3.4.0
    phpmyadmin phpmyadmin 3.3.5.0
    phpmyadmin phpmyadmin 3.3.5.1
    phpmyadmin phpmyadmin 3.3.6
    phpmyadmin phpmyadmin 3.3.7
    phpmyadmin phpmyadmin 3.3.8
    phpmyadmin phpmyadmin 3.3.5.1
    phpmyadmin phpmyadmin 2.11.11
    phpmyadmin phpmyadmin 3.3.6
    phpmyadmin phpmyadmin 2.11.10.1
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandriva enterprise server 5
    mandriva enterprise server 5