MEDIUM6.1
Multiple cross-site scripting (XSS) vulnerabilities in tbl_gis_visualization.php in phpMyAdmin 3.5.x before 3.5.8 might allow remote attackers to inject arbitrary web script or HTML via the (1) visualizationSettings[width] or (2) visualizationSettings[height] parameter. NOTE: a third party reports that this is "not exploitable.
CVSS 2.0MEDIUM 4.3
CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:NCVSS 3.xMEDIUM 6.1
CVSS:3.x/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NReferences
- http://archives.neohapsis.com/archives/fulldisclosure/2013-04/0101.html
- http://immunityservices.blogspot.com/2019/02/cvss.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103184.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103188.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103195.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html
- http://openwall.com/lists/oss-security/2013/04/09/13
- http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:144
- http://www.phpmyadmin.net/home_page/security/PMASA-2013-1.php
- http://www.waraxe.us/advisory-102.html
- https://github.com/phpmyadmin/phpmyadmin/commit/79089c9bc02c82c15419fd9d6496b8781ae08a5a
- http://archives.neohapsis.com/archives/fulldisclosure/2013-04/0101.html
- http://immunityservices.blogspot.com/2019/02/cvss.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103184.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103188.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103195.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html
- http://openwall.com/lists/oss-security/2013/04/09/13
- http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:144
- http://www.phpmyadmin.net/home_page/security/PMASA-2013-1.php
- http://www.waraxe.us/advisory-102.html
- https://github.com/phpmyadmin/phpmyadmin/commit/79089c9bc02c82c15419fd9d6496b8781ae08a5a