CVE-2009-3696

Cross-site scripting (XSS) vulnerability in phpMyAdmin 2.11.x before 2.11.9.6 and 3.x before 3.2.2.1 allows remote attackers to inject arbitrary web script or HTML via a crafted name for a MySQL table.
References
Link Resource
http://bugs.gentoo.org/show_bug.cgi?id=288899
http://dfn.dl.sourceforge.net/project/phpmyadmin/phpMyAdmin/2.11.9.6/phpMyAdmin-2.11.9.6-notes.html
http://dfn.dl.sourceforge.net/project/phpmyadmin/phpMyAdmin/3.2.2.1/phpMyAdmin-3.2.2.1-notes.html
http://freshmeat.net/projects/phpmyadmin/releases/306667
http://freshmeat.net/projects/phpmyadmin/releases/306669
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
http://marc.info/?l=oss-security&m=125553728512853&w=2
http://marc.info/?l=oss-security&m=125561979001460&w=2
http://secunia.com/advisories/37016 Vendor Advisory
http://typo3.org/extensions/repository/view/phpmyadmin/4.5.0/
http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-015/
http://www.mandriva.com/security/advisories?name=MDVSA-2009:274
http://www.phpmyadmin.net/home_page/security/PMASA-2009-6.php Patch Vendor Advisory
http://www.securityfocus.com/bid/36658
http://www.vupen.com/english/advisories/2009/2899 Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=528769
https://exchange.xforce.ibmcloud.com/vulnerabilities/53742
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00467.html
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00490.html
http://bugs.gentoo.org/show_bug.cgi?id=288899
http://dfn.dl.sourceforge.net/project/phpmyadmin/phpMyAdmin/2.11.9.6/phpMyAdmin-2.11.9.6-notes.html
http://dfn.dl.sourceforge.net/project/phpmyadmin/phpMyAdmin/3.2.2.1/phpMyAdmin-3.2.2.1-notes.html
http://freshmeat.net/projects/phpmyadmin/releases/306667
http://freshmeat.net/projects/phpmyadmin/releases/306669
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
http://marc.info/?l=oss-security&m=125553728512853&w=2
http://marc.info/?l=oss-security&m=125561979001460&w=2
http://secunia.com/advisories/37016 Vendor Advisory
http://typo3.org/extensions/repository/view/phpmyadmin/4.5.0/
http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-015/
http://www.mandriva.com/security/advisories?name=MDVSA-2009:274
http://www.phpmyadmin.net/home_page/security/PMASA-2009-6.php Patch Vendor Advisory
http://www.securityfocus.com/bid/36658
http://www.vupen.com/english/advisories/2009/2899 Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=528769
https://exchange.xforce.ibmcloud.com/vulnerabilities/53742
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00467.html
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00490.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:beta1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0beta1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.7:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.7.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.8:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.3:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.4:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.5:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0-alpha:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0-beta:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.1:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.0-beta1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3:1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.4:rc2:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.5:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.0-beta1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.1:rc1:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.2:rc1:*:*:*:*:*:*

History

21 Nov 2024, 01:07

Type Values Removed Values Added
References () http://bugs.gentoo.org/show_bug.cgi?id=288899 - () http://bugs.gentoo.org/show_bug.cgi?id=288899 -
References () http://dfn.dl.sourceforge.net/project/phpmyadmin/phpMyAdmin/2.11.9.6/phpMyAdmin-2.11.9.6-notes.html - () http://dfn.dl.sourceforge.net/project/phpmyadmin/phpMyAdmin/2.11.9.6/phpMyAdmin-2.11.9.6-notes.html -
References () http://dfn.dl.sourceforge.net/project/phpmyadmin/phpMyAdmin/3.2.2.1/phpMyAdmin-3.2.2.1-notes.html - () http://dfn.dl.sourceforge.net/project/phpmyadmin/phpMyAdmin/3.2.2.1/phpMyAdmin-3.2.2.1-notes.html -
References () http://freshmeat.net/projects/phpmyadmin/releases/306667 - () http://freshmeat.net/projects/phpmyadmin/releases/306667 -
References () http://freshmeat.net/projects/phpmyadmin/releases/306669 - () http://freshmeat.net/projects/phpmyadmin/releases/306669 -
References () http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html - () http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html -
References () http://marc.info/?l=oss-security&m=125553728512853&w=2 - () http://marc.info/?l=oss-security&m=125553728512853&w=2 -
References () http://marc.info/?l=oss-security&m=125561979001460&w=2 - () http://marc.info/?l=oss-security&m=125561979001460&w=2 -
References () http://secunia.com/advisories/37016 - Vendor Advisory () http://secunia.com/advisories/37016 - Vendor Advisory
References () http://typo3.org/extensions/repository/view/phpmyadmin/4.5.0/ - () http://typo3.org/extensions/repository/view/phpmyadmin/4.5.0/ -
References () http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-015/ - () http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-015/ -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:274 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:274 -
References () http://www.phpmyadmin.net/home_page/security/PMASA-2009-6.php - Patch, Vendor Advisory () http://www.phpmyadmin.net/home_page/security/PMASA-2009-6.php - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/36658 - () http://www.securityfocus.com/bid/36658 -
References () http://www.vupen.com/english/advisories/2009/2899 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/2899 - Patch, Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=528769 - () https://bugzilla.redhat.com/show_bug.cgi?id=528769 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/53742 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/53742 -
References () https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00467.html - () https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00467.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00490.html - () https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00490.html -

Information

Published : 2009-10-16 16:30

Updated : 2024-11-21 01:07


NVD link : CVE-2009-3696

Mitre link : CVE-2009-3696

CVE.ORG link : CVE-2009-3696


JSON object : View

Products Affected

phpmyadmin

  • phpmyadmin
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')