The branch, master has been updated
via 5b7fa0538813d55eb5ff980a6461e1ef23f0c52d (commit)
via 016be749df737089e59e3c8152d491d50e34c559 (commit)
via 0d8171b33aefc983404036b39dbea74919325ddd (commit)
from 0f8b2603b5a9b1d6765804deee11d056e549404b (commit)
- Log -----------------------------------------------------------------
commit 5b7fa0538813d55eb5ff980a6461e1ef23f0c52d
Author: Marc Delisle <[email protected]>
Date: Wed Dec 21 15:38:00 2011 -0500
Announcement date
commit 016be749df737089e59e3c8152d491d50e34c559
Author: Marc Delisle <[email protected]>
Date: Mon Dec 19 12:42:44 2011 -0500
PMASA-2011-19
commit 0d8171b33aefc983404036b39dbea74919325ddd
Author: Dieter Adriaenssens <[email protected]>
Date: Mon Dec 19 16:59:42 2011 +0100
PMASA-2011-20
-----------------------------------------------------------------------
Summary of changes:
.../security/{PMASA-2011-16 => PMASA-2011-19} | 13 ++---
templates/security/PMASA-2011-20 | 50 ++++++++++++++++++++
2 files changed, 56 insertions(+), 7 deletions(-)
copy templates/security/{PMASA-2011-16 => PMASA-2011-19} (76%)
create mode 100644 templates/security/PMASA-2011-20
diff --git a/templates/security/PMASA-2011-16 b/templates/security/PMASA-2011-19
similarity index 76%
copy from templates/security/PMASA-2011-16
copy to templates/security/PMASA-2011-19
index ae8b644..c474d90 100644
--- a/templates/security/PMASA-2011-16
+++ b/templates/security/PMASA-2011-19
@@ -1,11 +1,11 @@
<html xmlns:py="http://genshi.edgewall.org/"
xmlns:xi="http://www.w3.org/2001/XInclude" py:strip="">
<py:def function="announcement_id">
-PMASA-2011-16
+PMASA-2011-19
</py:def>
<py:def function="announcement_date">
-2011-10-17
+2011-12-21
</py:def>
<py:def function="announcement_summary">
@@ -33,20 +33,19 @@ Versions 3.4.x are affected.
</py:def>
<py:def function="announcement_solution">
-Upgrade to phpMyAdmin 3.4.6 or newer or apply the related patch listed below.
+Upgrade to phpMyAdmin 3.4.9 or newer or apply the related patch listed below.
</py:def>
<py:def function="announcement_references">
-Thanks to Jakub GaĆczyk (<a
href="http://hauntit.blogspot.com">http://hauntit.blogspot.com</a>) for
reporting this issue.
+Thanks to Jason Leyrer of Trustwave SpiderLabs for finding this issue and to
Robert Foggia (same company) for contacting us.
</py:def>
-<py:def function="announcement_cve">CVE-2011-4064</py:def>
+<py:def function="announcement_cve">CVE-2011-4782</py:def>
<py:def function="announcement_cwe">661 79</py:def>
<py:def function="announcement_commits">
-ca597dc423f3eebcca95ff33b088a03e39109115
-1af420e22367ae72ff4091adb1620e59ddad5ba6
+0e707906e69ce90c4852a0fce2a0fac7db86a3cd
</py:def>
<xi:include href="_page.tpl" />
diff --git a/templates/security/PMASA-2011-20 b/templates/security/PMASA-2011-20
new file mode 100644
index 0000000..2f51623
--- /dev/null
+++ b/templates/security/PMASA-2011-20
@@ -0,0 +1,50 @@
+<html xmlns:py="http://genshi.edgewall.org/"
xmlns:xi="http://www.w3.org/2001/XInclude" py:strip="">
+
+<py:def function="announcement_id">
+PMASA-2011-20
+</py:def>
+
+<py:def function="announcement_date">
+2011-12-21
+</py:def>
+
+<py:def function="announcement_summary">
+XSS in export.
+</py:def>
+
+<py:def function="announcement_description">
+Using crafted url parameters, it was possible to produce XSS on the export
panels in the server, database and table sections.
+</py:def>
+
+<py:def function="announcement_mitigation">
+These attacks are unlikely to succeed on a victim. Moreover, all these attacks
require that the user be already logged in and that a valid token be part of
the request.
+</py:def>
+
+<py:def function="announcement_severity">
+We consider these vulnerabilities to be non critical.
+</py:def>
+
+<py:def function="announcement_affected">
+Versions 3.4.x are affected.
+</py:def>
+
+<py:def function="announcement_solution">
+Upgrade to phpMyAdmin 3.4.9 or newer or apply the related patches listed below.
+</py:def>
+
+<py:def function="announcement_references">
+Thanks to <a href="https://twitter.com/totally_unknown">Nils Juenemann</a> for
reporting a vulnerable url parameter.
+</py:def>
+
+<py:def function="announcement_cve">CVE-2011-4780</py:def>
+
+<py:def function="announcement_cwe">661 79</py:def>
+
+<py:def function="announcement_commits">
+bd3735ba584e7a49aee78813845245354b061f61
+</py:def>
+
+<xi:include href="_page.tpl" />
+</html>
+
+
hooks/post-receive
--
phpMyAdmin website
------------------------------------------------------------------------------
Write once. Port to many.
Get the SDK and tools to simplify cross-platform app development. Create
new or port existing apps to sell to consumers worldwide. Explore the
Intel AppUpSM program developer opportunity. appdeveloper.intel.com/join
http://p.sf.net/sfu/intel-appdev
_______________________________________________
Phpmyadmin-git mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/phpmyadmin-git