From owner-svn-ports-all@freebsd.org Tue Mar 1 07:30:21 2016 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C1F6AABE061; Tue, 1 Mar 2016 07:30:21 +0000 (UTC) (envelope-from matthew@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 9ADCD137C; Tue, 1 Mar 2016 07:30:21 +0000 (UTC) (envelope-from matthew@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u217UKdw077598; Tue, 1 Mar 2016 07:30:20 GMT (envelope-from matthew@FreeBSD.org) Received: (from matthew@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id u217UKOL077597; Tue, 1 Mar 2016 07:30:20 GMT (envelope-from matthew@FreeBSD.org) Message-Id: <201603010730.u217UKOL077597@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: matthew set sender to matthew@FreeBSD.org using -f From: Matthew Seaman Date: Tue, 1 Mar 2016 07:30:20 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r409851 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 01 Mar 2016 07:30:22 -0000 Author: matthew Date: Tue Mar 1 07:30:20 2016 New Revision: 409851 URL: https://svnweb.freebsd.org/changeset/ports/409851 Log: Document the latest round of phpMyAdmin vulnerabilities. Lots of XSS problems, and a man-in-the-middle attack on API calls to GitHub. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Mar 1 06:40:57 2016 (r409850) +++ head/security/vuxml/vuln.xml Tue Mar 1 07:30:20 2016 (r409851) @@ -58,6 +58,73 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + phpmyadmin -- multiple XSS and a man-in-the-middle vulnerability + + + phpmyadmin + 4.5.04.5.5.1 + + + + +

The phpMyAdmin development team reports:

+
+

XSS vulnerability in SQL parser.

+

Using a crafted SQL query, it is possible to trigger an XSS + attack through the SQL query page.

+

We consider this vulnerability to be non-critical.

+
+
+

Multiple XSS vulnerabilities.

+

By sending a specially crafted URL as part of the HOST + header, it is possible to trigger an XSS attack.

+

A weakness was found that allows an XSS attack with Internet + Explorer versions older than 8 and Safari on Windows using a + specially crafted URL.

+

Using a crafted SQL query, it is possible to trigger an XSS + attack through the SQL query page.

+

Using a crafted parameter value, it is possible to trigger + an XSS attack in user accounts page.

+

Using a crafted parameter value, it is possible to trigger + an XSS attack in zoom search page.

+

We consider this vulnerability to be non-critical.

+
+
+

Multiple XSS vulnerabilities.

+

With a crafted table/column name it is possible to trigger + an XSS attack in the database normalization page.

+

With a crafted parameter it is possible to trigger an XSS + attack in the database structure page.

+

With a crafted parameter it is possible to trigger an XSS + attack in central columns page.

+

We consider this vulnerability to be non-critical.

+
+
+

Vulnerability allowing man-in-the-middle attack on API + call to GitHub.

+

A vulnerability in the API call to GitHub can be exploited + to perform a man-in-the-middle attack.

+

We consider this vulnerability to be serious.

+
+ +
+ + https://www.phpmyadmin.net/security/PMASA-2016-10/ + https://www.phpmyadmin.net/security/PMASA-2016-11/ + https://www.phpmyadmin.net/security/PMASA-2016-12/ + https://www.phpmyadmin.net/security/PMASA-2016-13/ + CVE-2016-2559 + CVE-2016-2560 + CVE-2016-2561 + CVE-2016-2562 + + + 2016-02-29 + 2016-03-01 + +
+ wireshark -- multiple vulnerabilities