Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=5721f8e0625fc70e594b93a3caff0e85515f33fa

commit 5721f8e0625fc70e594b93a3caff0e85515f33fa
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Sun Mar 9 00:55:15 2008 +0100

FSA387-phpmyadmin

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 97304d4..a6a49ff 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -27,6 +27,19 @@

<fsas>
<fsa>
+               <id>387</id>
+               <date>2008-03-09</date>
+               <author>vmiklos</author>
+               <package>phpmyadmin</package>
+               <vulnerable>2.11.2.2-1sayshell1</vulnerable>
+               <unaffected>2.11.5-1sayshell1</unaffected>
+               <bts>http://bugs.frugalware.org/task/2835</bts>
+               <cve>There is no CVE entry for this issue.</cve>
+               <desc>A vulnerability has been reported in phpMyAdmin, which 
can be exploited by malicious people to conduct SQL injection attacks.
+                       The vulnerability is caused due to the application 
obtaining parameters via the "$_REQUEST" variable, and using them without 
proper sanitation in SQL queries. This can be exploited to manipulate SQL 
queries by injecting arbitrary SQL code via a malicious cookie.
+                       Successful exploitation requires that a phpMyAdmin user 
is tricked into visiting a malicious website.</desc>
+       </fsa>
+       <fsa>
<id>386</id>
<date>2008-03-09</date>
<author>vmiklos</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to