CVE-2014-7217CVE-2014-7217

Affected configuration(s):

cpe:/a:phpmyadmin:phpmyadmin:4.0.0
cpe:/a:phpmyadmin:phpmyadmin:4.0.0:rc2
cpe:/a:phpmyadmin:phpmyadmin:4.0.0:rc3
cpe:/a:phpmyadmin:phpmyadmin:4.0.1
cpe:/a:phpmyadmin:phpmyadmin:4.0.2
cpe:/a:phpmyadmin:phpmyadmin:4.0.3
cpe:/a:phpmyadmin:phpmyadmin:4.0.4
cpe:/a:phpmyadmin:phpmyadmin:4.0.4.1
cpe:/a:phpmyadmin:phpmyadmin:4.0.4.2
cpe:/a:phpmyadmin:phpmyadmin:4.0.5
cpe:/a:phpmyadmin:phpmyadmin:4.0.6
cpe:/a:phpmyadmin:phpmyadmin:4.0.7
cpe:/a:phpmyadmin:phpmyadmin:4.0.8
cpe:/a:phpmyadmin:phpmyadmin:4.0.9
cpe:/a:phpmyadmin:phpmyadmin:4.1.0
cpe:/a:phpmyadmin:phpmyadmin:4.1.1
cpe:/a:phpmyadmin:phpmyadmin:4.1.2
cpe:/a:phpmyadmin:phpmyadmin:4.1.3
cpe:/a:phpmyadmin:phpmyadmin:4.1.4
cpe:/a:phpmyadmin:phpmyadmin:4.1.5
cpe:/a:phpmyadmin:phpmyadmin:4.1.6
cpe:/a:phpmyadmin:phpmyadmin:4.1.7
cpe:/a:phpmyadmin:phpmyadmin:4.1.8
cpe:/a:phpmyadmin:phpmyadmin:4.1.9
cpe:/a:phpmyadmin:phpmyadmin:4.1.10
cpe:/a:phpmyadmin:phpmyadmin:4.1.11
cpe:/a:phpmyadmin:phpmyadmin:4.1.12
cpe:/a:phpmyadmin:phpmyadmin:4.1.13
cpe:/a:phpmyadmin:phpmyadmin:4.1.14
cpe:/a:phpmyadmin:phpmyadmin:4.1.14.1
cpe:/a:phpmyadmin:phpmyadmin:4.1.14.3
cpe:/a:phpmyadmin:phpmyadmin:4.1.14.4
cpe:/a:phpmyadmin:phpmyadmin:4.2.0
cpe:/a:phpmyadmin:phpmyadmin:4.2.1
cpe:/a:phpmyadmin:phpmyadmin:4.2.2
cpe:/a:phpmyadmin:phpmyadmin:4.2.3
cpe:/a:phpmyadmin:phpmyadmin:4.2.4
cpe:/a:phpmyadmin:phpmyadmin:4.2.5
cpe:/a:phpmyadmin:phpmyadmin:4.2.7
cpe:/a:phpmyadmin:phpmyadmin:4.2.7.1
cpe:/a:phpmyadmin:phpmyadmin:4.2.8
cpe:/a:phpmyadmin:phpmyadmin:4.2.8.1
cpe:/a:phpmyadmin:phpmyadmin:4.2.9

Date published: 2014-10-02T21:55:08.563-04:00

Date last modified: 2016-04-04T09:15:00.763-04:00

CVSS Score: 3.5

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://lists.opensuse.org/opensuse-updates/2014-10/msg00009.html

Summary: Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.4, 4.1.x before 4.1.14.5, and 4.2.x before 4.2.9.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted ENUM value that is improperly handled during rendering of the (1) table search or (2) table structure page, related to libraries/TableSearch.class.php and libraries/Util.class.php.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.