DSA-1675-1 phpmyadmin -- insufficient input sanitising

Related Vulnerabilities: CVE-2008-4326  

Masako Oono discovered that phpMyAdmin, a web-based administration interface for MySQL, insufficiently sanitises input allowing a remote attacker to gather sensitive data through cross site scripting, provided that the user uses the Internet Explorer web browser. This update also fixes a regression introduced in DSA 1641, that broke changing of the language and encoding in the login screen. For the stable distribution (etch), these problems have been fixed in version 4:2.9.1.1-9. For the unstable distribution (sid), these problems have been fixed in version 4:2.11.8.1-3. We recommend that you upgrade your phpmyadmin package.

Debian Security Advisory

DSA-1675-1 phpmyadmin -- insufficient input sanitising

Date Reported:
30 Nov 2008
Affected Packages:
phpmyadmin
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2008-4326.
More information:

Masako Oono discovered that phpMyAdmin, a web-based administration interface for MySQL, insufficiently sanitises input allowing a remote attacker to gather sensitive data through cross site scripting, provided that the user uses the Internet Explorer web browser.

This update also fixes a regression introduced in DSA 1641, that broke changing of the language and encoding in the login screen.

For the stable distribution (etch), these problems have been fixed in version 4:2.9.1.1-9.

For the unstable distribution (sid), these problems have been fixed in version 4:2.11.8.1-3.

We recommend that you upgrade your phpmyadmin package.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1-9.dsc
http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1.orig.tar.gz
http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1-9.diff.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1-9_all.deb

MD5 checksums of the listed files are available in the original advisory.