fkie_cve-2011-2642
Vulnerability from fkie_nvd
Published
2011-08-01 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the table Print view implementation in tbl_printview.php in phpMyAdmin before 3.3.10.3 and 3.4.x before 3.4.3.2 allow remote authenticated users to inject arbitrary web script or HTML via a crafted table name.
References
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html
cve@mitre.orghttp://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=4bd27166c314faa37cada91533b86377f4d4d214
cve@mitre.orghttp://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=a0823be05aa5835f207c0838b9cca67d2d9a050a
cve@mitre.orghttp://secunia.com/advisories/45315
cve@mitre.orghttp://secunia.com/advisories/45365Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/45515
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2286
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2011:124
cve@mitre.orghttp://www.phpmyadmin.net/home_page/security/PMASA-2011-9.phpPatch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/48874
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=725381Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/68750
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html
af854a3a-2127-422b-91ae-364da2661108http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=4bd27166c314faa37cada91533b86377f4d4d214
af854a3a-2127-422b-91ae-364da2661108http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=a0823be05aa5835f207c0838b9cca67d2d9a050a
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45315
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45365Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45515
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2286
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:124
af854a3a-2127-422b-91ae-364da2661108http://www.phpmyadmin.net/home_page/security/PMASA-2011-9.phpPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/48874
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=725381Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/68750
Impacted products
Vendor Product Version
phpmyadmin phpmyadmin *
phpmyadmin phpmyadmin 2.11.0
phpmyadmin phpmyadmin 2.11.1.0
phpmyadmin phpmyadmin 2.11.1.1
phpmyadmin phpmyadmin 2.11.1.2
phpmyadmin phpmyadmin 2.11.2.0
phpmyadmin phpmyadmin 2.11.2.1
phpmyadmin phpmyadmin 2.11.2.2
phpmyadmin phpmyadmin 2.11.3.0
phpmyadmin phpmyadmin 2.11.4.0
phpmyadmin phpmyadmin 2.11.5.0
phpmyadmin phpmyadmin 2.11.5.1
phpmyadmin phpmyadmin 2.11.5.2
phpmyadmin phpmyadmin 2.11.6.0
phpmyadmin phpmyadmin 2.11.7.0
phpmyadmin phpmyadmin 2.11.7.1
phpmyadmin phpmyadmin 2.11.8.0
phpmyadmin phpmyadmin 2.11.9.0
phpmyadmin phpmyadmin 2.11.9.1
phpmyadmin phpmyadmin 2.11.9.2
phpmyadmin phpmyadmin 2.11.9.3
phpmyadmin phpmyadmin 2.11.9.4
phpmyadmin phpmyadmin 2.11.9.5
phpmyadmin phpmyadmin 2.11.9.6
phpmyadmin phpmyadmin 2.11.10.0
phpmyadmin phpmyadmin 2.11.10.1
phpmyadmin phpmyadmin 3.0.0
phpmyadmin phpmyadmin 3.0.0
phpmyadmin phpmyadmin 3.0.0
phpmyadmin phpmyadmin 3.0.0
phpmyadmin phpmyadmin 3.0.1
phpmyadmin phpmyadmin 3.0.1
phpmyadmin phpmyadmin 3.0.1.1
phpmyadmin phpmyadmin 3.1.0
phpmyadmin phpmyadmin 3.1.0
phpmyadmin phpmyadmin 3.1.1
phpmyadmin phpmyadmin 3.1.1
phpmyadmin phpmyadmin 3.1.2
phpmyadmin phpmyadmin 3.1.2
phpmyadmin phpmyadmin 3.1.3
phpmyadmin phpmyadmin 3.1.3
phpmyadmin phpmyadmin 3.1.3.1
phpmyadmin phpmyadmin 3.1.3.2
phpmyadmin phpmyadmin 3.1.4
phpmyadmin phpmyadmin 3.1.4
phpmyadmin phpmyadmin 3.1.5
phpmyadmin phpmyadmin 3.1.5
phpmyadmin phpmyadmin 3.2.0
phpmyadmin phpmyadmin 3.2.0
phpmyadmin phpmyadmin 3.2.0
phpmyadmin phpmyadmin 3.2.1
phpmyadmin phpmyadmin 3.2.1
phpmyadmin phpmyadmin 3.2.2
phpmyadmin phpmyadmin 3.2.2
phpmyadmin phpmyadmin 3.3.0.0
phpmyadmin phpmyadmin 3.3.1.0
phpmyadmin phpmyadmin 3.3.2.0
phpmyadmin phpmyadmin 3.3.3.0
phpmyadmin phpmyadmin 3.3.4.0
phpmyadmin phpmyadmin 3.3.5.0
phpmyadmin phpmyadmin 3.3.5.1
phpmyadmin phpmyadmin 3.3.6
phpmyadmin phpmyadmin 3.3.7
phpmyadmin phpmyadmin 3.3.8
phpmyadmin phpmyadmin 3.3.8.1
phpmyadmin phpmyadmin 3.3.9.0
phpmyadmin phpmyadmin 3.3.9.1
phpmyadmin phpmyadmin 3.3.9.2
phpmyadmin phpmyadmin 3.3.10.0
phpmyadmin phpmyadmin 3.3.10.1
phpmyadmin phpmyadmin 3.4.0.0
phpmyadmin phpmyadmin 3.4.1.0
phpmyadmin phpmyadmin 3.4.2.0
phpmyadmin phpmyadmin 3.4.3.0
phpmyadmin phpmyadmin 3.4.3.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCAB9FFF-8ED8-456F-8E46-C09152648E8B",
              "versionEndIncluding": "3.3.10.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A98FF47C-8BA8-40E1-98F5-743CAD5DC52A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BC82C85-C9CF-424D-A07A-E841F7AC1904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0549FC5-B8E8-455D-867B-BAF321DE7004",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "01DA6D40-2D3A-4490-B4E6-1367C585ED9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "34AB221E-3DFA-43E4-9DBA-5565F81C0120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCB774D1-8B5D-4118-8A5B-D7D14D7DE162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C10F7C9-FAAA-4D05-8CB2-F5CB397F8410",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8AAB78-8460-43BB-9326-0395F7496EC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3329598B-BEA5-4119-A558-DAA432239A84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA5BCF7D-43FC-459C-8564-F0DCDC301FC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6A75C9-C695-45DF-9526-8DEA506FB21F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03246EF4-F805-4C1C-9E6C-D85AFBD2D168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF4BA83-50C0-4D90-9755-CC99A0FF987E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E709A6B-B580-414B-8CEE-8FF99F8409C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3B9AD02-9D59-42D5-8886-A053219EE5F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1648F2C4-40C6-438B-86B0-2D1E37C78B45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A26E7D37-FA99-42EA-8E19-ED2343E8E70A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A982E152-5A20-4A3A-9A98-6CF9EEF9141A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFA11353-1DD1-4593-84E8-1D3CBB2C2166",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0C19FB-60DF-440F-9A32-B9C62EBA9836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9716FC40-F759-4D24-9604-7A2DB32A8F42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "399A4EF5-FBDC-4856-89A5-821011E5E7E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4834A26C-C0FD-4D8D-9385-8022D3F4BF44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "909FDD04-9A4D-42F6-B9C7-0A6262D04492",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "600327B4-A072-4BDF-97CF-AFAFC4B508DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ED38B88-A4D2-40B4-A5A8-A9FD1BCAAF8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "5E5D29CC-12CE-43D3-A135-C148542E5AAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "BAF28FF5-6FF5-47D8-BEB9-D54E58C0740F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "613C697A-7CFF-4529-BD15-0ED4B753527A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "56908EFC-CCA8-4B22-8F8F-FB23C934D6E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "82DFC89B-F989-41C5-87E2-11A259E7F5C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.0.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F21917E9-A820-4A5F-B38B-E3E0F79A380C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "400E2D41-CB1F-4E5C-B08D-35294F8D1402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "16247466-32B5-4632-9F4E-92A70ED9604D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4AFEEBA-01BA-46D6-86A3-B1B5A8F1B5FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3F72014B-B168-4FFA-ADDC-86CE84D19681",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFFE8553-D8FF-4BA3-9325-A3C366FDFBEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "72CD1784-3F48-49B5-A154-61C1F7EC3F61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAAA1171-F570-4E4D-B667-2D4C8F8ECDD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "278B4EF3-4331-4334-AB55-EC05C069F48A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4943CF80-91E5-42CD-BD51-6CAFC83EA5A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0284F72-2126-4BE8-90CA-82D2E4B3E96D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C24AEFB1-7070-4F9B-BCDA-60F33C17D536",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E8D735F4-165E-45C9-BF3B-9B618A8E3720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E60F6F-C855-45BF-8840-398FA62626EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F4EDCE1E-436A-4369-A734-7D620F5D89B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "98051D18-43E3-47D6-A8D4-AD9F0C8B0A7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6B468BEA-022D-48A9-8E52-31D78F28E871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "78BC489B-E02E-4C6E-9EA1-EDC926EBA5BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDCB1657-8C8F-44FE-8C1D-BF191DE70657",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "35F44A77-1169-4A0D-8864-EB7AF56324AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE0CFF97-8F8B-405D-BA59-B88C1C07A4C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "BA3C0B46-3964-4A22-9AD4-4F4C8B4B4790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "84100813-C889-4DB0-8D86-E78A047B7C7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B99F558E-F696-467D-8C8B-5CFFED2A95D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "85BA84E5-8631-478C-8229-CFF36F61569A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "77430AB8-6EAA-4C99-9700-E5015F8D56FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CFADB43-A63B-4A58-9A9D-232B0CA3F9DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FC756B-8CF7-4F57-A6AA-8C074F14BCA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EE1361B-D70B-45B9-BD2F-7C049D96928A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "06EE0CCB-559F-457B-A1EC-79D0680DCDD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "00826A60-50A4-4E05-B317-8D0A5FC637BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AC1AECC-6521-4D9D-88D5-86DA8BDB1D26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "79093150-F515-42D9-AEF2-86C0C4B1B8AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FE65F49-CDED-49B0-89F4-CE52E357069A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B29D2E6-F327-4B19-B33F-E888F8B81E7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C579327-8F92-41AF-926A-86442063A83D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C3F84C4-883B-48DC-9181-E54A87DC973B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C10C216-594B-4F08-B86E-A476A452189B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C714361-7AE3-4DC2-994C-7C67B41226B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A3CED16-3ECE-49F6-A52B-0222B14DBC88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4938BCE-1365-469A-B714-A5D9C451FA20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F46942-E054-43E4-9543-E126738845E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A24EBE-D760-4251-972E-86B71EC8A07D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in the table Print view implementation in tbl_printview.php in phpMyAdmin before 3.3.10.3 and 3.4.x before 3.4.3.2 allow remote authenticated users to inject arbitrary web script or HTML via a crafted table name."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS)  en la vista de implementaci\u00f3n en la tabla Print en tbl_printview.php en phpMyAdmin anterior a v3.3.10.3 y v3.4.x anterior a v3.4.3.2 permite a usuarios autenticados de forma remota inyectar c\u00f3digo script web de su elecci\u00f3n o HTML a trav\u00e9s de un nombre de tabla manipulado."
    }
  ],
  "evaluatorImpact": "Per: http://www.phpmyadmin.net/home_page/security/PMASA-2011-9.php\r\n\r\n\u0027The attacker must trick the victim into clicking a link that reaches phpMyAdmin\u0027s table print view script; one of the link\u0027s parameters is a crafted table name (the name containing Javascript code).\u0027\r\n\r\n\u0027Mitigation factor\r\n\r\nThe crafted table name must exist (the attacker must have access to create a table on the victim\u0027s server).\u0027",
  "id": "CVE-2011-2642",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-08-01T19:55:01.337",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=4bd27166c314faa37cada91533b86377f4d4d214"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=a0823be05aa5835f207c0838b9cca67d2d9a050a"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/45315"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45365"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/45515"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2286"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:124"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2011-9.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/48874"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=725381"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68750"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=4bd27166c314faa37cada91533b86377f4d4d214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=a0823be05aa5835f207c0838b9cca67d2d9a050a"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/45315"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45365"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/45515"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2286"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2011-9.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48874"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=725381"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68750"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…