Release date: 2011-10-14
Updated on: 2011-10-14
Affected Systems:
PhpPgAdmin 5.0.2
Unaffected system:
PhpPgAdmin 5.0.3
Description:
--------------------------------------------------------------------------------
Bugtraq id: 49914
Cve id: CVE-2010-3598
PhpPgAdmin is a free PHP-based software package that provides a graphical interface for PostgreSQL database management.
Multiple cross-site scripting vulnerabilities exist in the implementation of phpPgAdmin. Remote attackers can exploit these vulnerabilities to execute arbitrary script code in the user browsers of the affected sites to steal cookie authentication creden.
1) when classes/Misc. php does not properly filter some input related to the page title, it is returned to the user and can be used to execute HTML and script code.
2) If the data in the "return_url" and "return_desc" parameters in display. php is not properly filtered, the data is returned to the user.
<* Source: Mateusz Goik
Link: http://www.securelist.com/en/advisories/46248
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
PhpPgAdmin
----------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://phppgadmin.sourceforge.net /? Page = home