{ "id": "CVE-2007-1395", "sourceIdentifier": "cve@mitre.org", "published": "2007-03-10T22:19:00.000", "lastModified": "2018-10-16T16:38:22.313", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incomplete blacklist vulnerability in index.php in phpMyAdmin 2.8.0 through 2.9.2 allows remote attackers to conduct cross-site scripting (XSS) attacks by injecting arbitrary JavaScript or HTML in a (1) db or (2) table parameter value followed by an uppercase end tag, which bypasses the protection against lowercase ." }, { "lang": "es", "value": "Vulnerabilidad de lista negra incompleta en index.php en phpMyAdmin 2.8.0 hasta 2.9.2 permite a atacantes remotos llevar a cabo ataques de secuencias de comandos de sitios cruzados (XSS) por inyecci\u00f3n de JavaScript de su elecci\u00f3n o HTML en un valor par\u00e1metro (1)db o (2) table seguido de una etiqueta de fin \"may\u00fascula\" , la cual evita la protecci\u00f3n contra la \"min\u00fascula\" ." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "60F2B3C2-0EDB-48D3-92BC-B1CA0E41F230" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D9852676-A91F-4FD6-A734-BF7E048411FD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FC64B22B-E415-4510-A0DF-CE4763A423D1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "12375469-DD81-42BE-8BC0-FCAB0D2D6253" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FCEF6246-C393-41BE-BABC-840585795D53" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.1_dev:*:*:*:*:*:*:*", "matchCriteriaId": "E384B8D4-C72C-4D3D-A25F-26FB5F1D4B89" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "A2ACC829-CF64-4F20-8827-AA95002A6F5F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "05D4C98E-D127-40EB-BE71-A6BB91D4392C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "4C26B2DE-669F-4F79-99AE-3210662AAB85" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "E4B64201-5B5B-4D22-B341-C601DC54BFB3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "44DA3E88-1572-484D-A4DB-A99EF7D73129" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3E65F392-A841-461A-921C-91F40330F3F4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5A7F2F4E-7DCC-43F8-BB69-BE553C2F8F66" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1CDE3326-8B3F-4C3A-BA40-6F91CDFAFA76" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "36C4A673-5ACD-4D1A-A780-5CD279230051" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_dev:*:*:*:*:*:*:*", "matchCriteriaId": "0534C39C-A421-4C97-8A96-A74ABFA78B92" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "9BD0DFB0-92F1-4914-A637-A2EBCE0A9BCF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "E6354257-6B1A-4729-9EE2-19D3CD2AD62B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4686B445-3843-4173-8565-16BF364EF911" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "1519A451-0EC8-4718-991D-948572C08410" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc2:*:*:*:*:*:*:*", "matchCriteriaId": "9ACAA116-2853-456B-BC9C-B036A0F99FB3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "A8AF5A1A-328E-43A1-8C41-0DAB1F337FA6" } ] } ] } ], "references": [ { "url": "http://osvdb.org/35048", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/26733", "source": "cve@mitre.org" }, { "url": "http://securityreason.com/securityalert/2402", "source": "cve@mitre.org" }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:199", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/archive/1/462139/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://www.us.debian.org/security/2007/dsa-1370", "source": "cve@mitre.org" }, { "url": "http://www.virtuax.be/advisories/Advisory2-24012007.txt", "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32858", "source": "cve@mitre.org" } ] }