Bug 870012 (CVE-2012-5368) - CVE-2012-5368 phpMyAdmin: Obtaining current phpMyAdmin version from non SSL site is prone to MITM attack (PMASA-2012-7)
Summary: CVE-2012-5368 phpMyAdmin: Obtaining current phpMyAdmin version from non SSL s...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-5368
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 849010
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-10-25 11:09 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:56 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2014-07-19 15:42:57 UTC
Embargoed:


Attachments (Terms of Use)

Description Jan Lieskovsky 2012-10-25 11:09:57 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2012-5368 to the following vulnerability:

phpMyAdmin 3.5.x before 3.5.3 uses JavaScript code that is obtained through an HTTP session to phpmyadmin.net without SSL, which allows man-in-the-middle attackers to conduct cross-site scripting (XSS) attacks by modifying this code.

References:
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5368
[2] http://www.phpmyadmin.net/home_page/security/PMASA-2012-7.php
[3] https://github.com/phpmyadmin/phpmyadmin/commit/50edafc0884aa15d0a1aa178089ac6a1ad2eb18a
[4] https://github.com/phpmyadmin/phpmyadmin/commit/a547f3d3e2cf36c6a904fa3e053fd8bddd3fbbb0

Comment 1 Jan Lieskovsky 2012-10-25 11:12:12 UTC
The following updates have been created to correct this issue in phpMyAdmin package versions, as shipped with Fedora and Fedora EPEL:
1) phpMyAdmin-3.5.3-1.fc17 for Fedora 17,
2) phpMyAdmin-3.5.3-1.fc16 for Fedora 16,
3) phpMyAdmin-3.5.3-1.el6 for Fedora EPEL 6
4) phpMyAdmin3-3.5.3-1.el5 for Fedora EPEL 5.

This issue did NOT affect the version of the phpMyAdmin package (2.X based) as shipped with Fedora EPEL 5.


Note You need to log in before you can comment on or make changes to this bug.