Login
Newsletter
Werbung

Sicherheit: Cross-Site Scripting in phpMyAdmin
Aktuelle Meldungen Distributionen
Name: Cross-Site Scripting in phpMyAdmin
ID: FEDORA-2018-68349e3094
Distribution: Fedora
Plattformen: Fedora 28
Datum: Mo, 2. Juli 2018, 07:33
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12581
Applikationen: phpMyAdmin

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2018-68349e3094
2018-07-01 22:34:28.806079
-------------------------------------------------------------------------------
-

Name : phpMyAdmin
Product : Fedora 28
Version : 4.8.2
Release : 1.fc28
URL : https://www.phpmyadmin.net/
Summary : Handle the administration of MySQL over the World Wide Web
Description :
phpMyAdmin is a tool written in PHP intended to handle the administration of
MySQL over the World Wide Web. Most frequently used operations are supported
by the user interface (managing databases, tables, fields, relations, indexes,
users, permissions), while you still have the ability to directly execute any
SQL statement.

Features include an intuitive web interface, support for most MySQL features
(browse and drop databases, tables, views, fields and indexes, create, copy,
drop, rename and alter databases, tables, fields and indexes, maintenance
server, databases and tables, with proposals on server configuration, execute,
edit and bookmark any SQL-statement, even batch-queries, manage MySQL users
and privileges, manage stored procedures and triggers), import data from CSV
and SQL, export data to various formats: CSV, SQL, XML, PDF, OpenDocument Text
and Spreadsheet, Word, Excel, LATEX and others, administering multiple servers,
creating PDF graphics of your database layout, creating complex queries using
Query-by-example (QBE), searching globally in a database or a subset of it,
transforming stored data into any format using a set of predefined functions,
like displaying BLOB-data as image or download-link and much more...

-------------------------------------------------------------------------------
-
Update Information:

Upstream announcement: The phpMyAdmin team is pleased to announce the release
of **phpMyAdmin version 4.8.2**. Among other bug fixes, this contains an
important security update and it is highly recommended that all users upgrade
immediately. The urgent vulnerability allows an authenticated attacker to
exploit a phpMyAdmin feature to show and potentially execute files on the
server. PHP open_basedir restrictions mitigate the effect of this flaw. For
further details, see the PMASA announcement . A second flaw was also fixed
allowing an attacker to use a specially crafted database name to trick a user
in
to executing a cross-site scripting (XSS) attack in the Designer feature . In
addition to the security fixes, this release also includes these bug fixes as
part of our regular release cycle: * WHERE 0 clause causes a fatal error * Fix
missing "INDEX" icon
-------------------------------------------------------------------------------
-
ChangeLog:

* Fri Jun 22 2018 Remi Collet <remi@remirepo.net> - 4.8.2-1
- update to 4.8.2 (2018-06-21, important security fix)
* Fri May 25 2018 Remi Collet <remi@remirepo.net> - 4.8.1-1
- update to 4.8.1 (2018-05-25, bug fix release)
* Thu Apr 19 2018 Remi Collet <remi@remirepo.net> - 4.8.0.1-1
- update to 4.8.0.1 (2018-04-19, security release)
- add dependency on symfony/polyfill-mbstring for PHP < 7.2
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1594407 - CVE-2018-12581 phpMyAdmin: XSS when the database is
referenced from the Designer feature
https://bugzilla.redhat.com/show_bug.cgi?id=1594407
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2018-68349e3094' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AE2PXNVCMMBI7GCDXKENS7XXKS3FV3RL/
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung