4.3
CVSSv2

CVE-2005-2869

Published: 08/09/2005 Updated: 05/09/2008
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin prior to 2.6.4 allow remote malicious users to inject arbitrary web script or HTML via (1) the Username to libraries/auth/cookie.auth.lib.php or (2) the error parameter to error.php.

Vulnerable Product Search on Vulmon Subscribe to Product

phpmyadmin phpmyadmin 2.2.2

phpmyadmin phpmyadmin 2.2.3

phpmyadmin phpmyadmin 2.2.4

phpmyadmin phpmyadmin 2.2.5

phpmyadmin phpmyadmin 2.5.4

phpmyadmin phpmyadmin 2.5.5

phpmyadmin phpmyadmin 2.5.5_pl1

phpmyadmin phpmyadmin 2.5.5_rc1

phpmyadmin phpmyadmin 2.6.2_pl1

phpmyadmin phpmyadmin 2.6.3

phpmyadmin phpmyadmin 2.6.3_pl1

phpmyadmin phpmyadmin 2.0.2

phpmyadmin phpmyadmin 2.0.3

phpmyadmin phpmyadmin 2.0.4

phpmyadmin phpmyadmin 2.0.5

phpmyadmin phpmyadmin 2.2_rc2

phpmyadmin phpmyadmin 2.2_rc3

phpmyadmin phpmyadmin 2.3.1

phpmyadmin phpmyadmin 2.3.2

phpmyadmin phpmyadmin 2.4.0

phpmyadmin phpmyadmin 2.6.0_pl1

phpmyadmin phpmyadmin 2.6.0_pl2

phpmyadmin phpmyadmin 2.6.0_pl3

phpmyadmin phpmyadmin 2.6.1

phpmyadmin phpmyadmin 2.0

phpmyadmin phpmyadmin 2.1.1

phpmyadmin phpmyadmin 2.2

phpmyadmin phpmyadmin 2.2.6

phpmyadmin phpmyadmin 2.2_pre2

phpmyadmin phpmyadmin 2.5.0

phpmyadmin phpmyadmin 2.5.2

phpmyadmin phpmyadmin 2.5.6_rc1

phpmyadmin phpmyadmin 2.5.7_pl1

phpmyadmin phpmyadmin 2.6.1_pl1

phpmyadmin phpmyadmin 2.6.1_rc1

phpmyadmin phpmyadmin 2.0.1

phpmyadmin phpmyadmin 2.1

phpmyadmin phpmyadmin 2.1.2

phpmyadmin phpmyadmin 2.2_pre1

phpmyadmin phpmyadmin 2.2_rc1

phpmyadmin phpmyadmin 2.5.1

phpmyadmin phpmyadmin 2.5.3

phpmyadmin phpmyadmin 2.5.5_rc2

phpmyadmin phpmyadmin 2.5.7

phpmyadmin phpmyadmin 2.6.1_pl3

phpmyadmin phpmyadmin 2.6.2

Exploits

source: wwwsecurityfocuscom/bid/14675/info phpMyAdmin is prone to a cross-site scripting vulnerability This issue may be exploited to steal cookie-based authentication credentials from legitimate users of the software Such an attack would require that the victim follows a malicious link that includes hostile HTML and script code /er ...