Bug 528769 (CVE-2009-3696, CVE-2009-3697) - CVE-2009-3696 CVE-2009-3697 phpMyAdmin: XSS and SQL injection (PMASA-2009-6)
Summary: CVE-2009-3696 CVE-2009-3697 phpMyAdmin: XSS and SQL injection (PMASA-2009-6)
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2009-3696, CVE-2009-3697
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://www.phpmyadmin.net/home_page/n...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-10-13 16:13 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:32 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-01-04 07:42:24 UTC
Embargoed:


Attachments (Terms of Use)

Comment 1 Robert Scheck 2009-10-13 16:17:49 UTC
Already known to me, will submit updates this evening (next few hours).

Comment 2 Robert Scheck 2009-10-13 22:02:03 UTC
Package: phpMyAdmin-2.11.9.6-1.el4 Tag: dist-4E-epel-testing-candidate Status: complete Built by: robert
Package: phpMyAdmin-2.11.9.6-1.el5 Tag: dist-5E-epel-testing-candidate Status: complete Built by: robert

Package: phpMyAdmin-3.2.2.1-1.fc10 Tag: dist-f10-updates-candidate Status: complete Built by: robert
Package: phpMyAdmin-3.2.2.1-1.fc11 Tag: dist-f11-updates-candidate Status: complete Built by: robert
Package: phpMyAdmin-3.2.2.1-1.fc12 Tag: dist-f12-updates-candidate Status: complete Built by: robert
Package: phpMyAdmin-3.2.2.1-1.fc13 Tag: dist-f13 Status: complete Built by: robert

Comment 3 Fedora Update System 2009-10-13 22:02:28 UTC
phpMyAdmin-2.11.9.6-1.el4 has been submitted as an update for Fedora EPEL 4.
http://admin.fedoraproject.org/updates/phpMyAdmin-2.11.9.6-1.el4

Comment 4 Fedora Update System 2009-10-13 22:02:32 UTC
phpMyAdmin-2.11.9.6-1.el5 has been submitted as an update for Fedora EPEL 5.
http://admin.fedoraproject.org/updates/phpMyAdmin-2.11.9.6-1.el5

Comment 5 Fedora Update System 2009-10-13 22:03:47 UTC
phpMyAdmin-3.2.2.1-1.fc10 has been submitted as an update for Fedora 10.
http://admin.fedoraproject.org/updates/phpMyAdmin-3.2.2.1-1.fc10

Comment 6 Fedora Update System 2009-10-13 22:04:11 UTC
phpMyAdmin-3.2.2.1-1.fc11 has been submitted as an update for Fedora 11.
http://admin.fedoraproject.org/updates/phpMyAdmin-3.2.2.1-1.fc11

Comment 7 Robert Scheck 2009-10-13 22:08:56 UTC
Fedora 12 is waiting for tagging, https://fedorahosted.org/rel-eng/ticket/2470

Comment 8 Jan Lieskovsky 2009-10-15 07:47:30 UTC
Quoting upstream PMASA-2009-6 advisory for CVE description:

CVE-2009-3696 Cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via a crafted MySQL table name.

CVE-2000-3697 SQL injection vulnerability allows remote attackers to inject SQL via various interface parameters of the PDF schema generator feature.

Comment 9 Fedora Update System 2009-10-15 22:33:14 UTC
phpMyAdmin-3.2.2.1-1.fc10 has been pushed to the Fedora 10 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 10 Fedora Update System 2009-10-15 22:38:22 UTC
phpMyAdmin-3.2.2.1-1.fc11 has been pushed to the Fedora 11 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 11 Fedora Update System 2009-10-16 19:32:31 UTC
phpMyAdmin-2.11.9.6-1.el5 has been pushed to the Fedora EPEL 5 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 12 Fedora Update System 2009-10-16 19:34:42 UTC
phpMyAdmin-2.11.9.6-1.el4 has been pushed to the Fedora EPEL 4 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 13 Robert Scheck 2010-01-04 00:09:40 UTC
Can't we close this bug report?

Comment 14 Tomas Hoger 2010-01-04 07:42:24 UTC
Yes, feel free to close any phpMyAdmin-related Security Response bugs when all affected Fedora and EPEL versions are fixed.  It's currently not part of any Red Hat product.  Thank you!


Note You need to log in before you can comment on or make changes to this bug.