From af82a899790cb81b4f1a2ec18a8f54814d14ab5c Mon Sep 17 00:00:00 2001 From: Andrew Pantyukhin Date: Mon, 2 Oct 2006 06:59:06 +0000 Subject: [PATCH] - Document latest XSRF vulnerabilities in phpmyadmin --- security/vuxml/vuln.xml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index ed3c541d7a33..8a90afd15243 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,37 @@ Note: Please add new entries to the beginning of this file. --> + + phpmyadmin -- XSRF vulnerabilities + + + phpMyAdmin + 2.9.0.1 + + + + +

phpMyAdmin team reports:

+
+

We received a security advisory from Stefan Esser + (sesser@hardened-php.net) and we wish to thank him for his + work.

+

It was possible to inject arbitrary SQL commands by + forcing an authenticated user to follow a crafted link.

+
+ +
+ + http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-5 + http://secunia.com/advisories/22126/ + 20253 + + + 2006-09-28 + 2006-10-02 + +
+ openssh -- multiple vulnerabilities