Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=5721f8e0625fc70e594b93a3caff0e85515f33fa
commit 5721f8e0625fc70e594b93a3caff0e85515f33fa Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Sun Mar 9 00:55:15 2008 +0100 FSA387-phpmyadmin diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 97304d4..a6a49ff 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -27,6 +27,19 @@ <fsas> <fsa> + <id>387</id> + <date>2008-03-09</date> + <author>vmiklos</author> + <package>phpmyadmin</package> + <vulnerable>2.11.2.2-1sayshell1</vulnerable> + <unaffected>2.11.5-1sayshell1</unaffected> + <bts>http://bugs.frugalware.org/task/2835</bts> + <cve>There is no CVE entry for this issue.</cve> + <desc>A vulnerability has been reported in phpMyAdmin, which can be exploited by malicious people to conduct SQL injection attacks. + The vulnerability is caused due to the application obtaining parameters via the "$_REQUEST" variable, and using them without proper sanitation in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code via a malicious cookie. + Successful exploitation requires that a phpMyAdmin user is tricked into visiting a malicious website.</desc> + </fsa> + <fsa> <id>386</id> <date>2008-03-09</date> <author>vmiklos</author> _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
