CVE-2007-5589

Phpmyadmin < 2.11.1.1 - XSS

Title source: rule
STIX 2.1

Description

Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.11.1.2 allow remote attackers to inject arbitrary web script or HTML via certain input available in (1) PHP_SELF in (a) server_status.php, and (b) grab_globals.lib.php, (c) display_change_password.lib.php, and (d) common.lib.php in libraries/; and certain input available in PHP_SELF and (2) PATH_INFO in libraries/common.inc.php. NOTE: there might also be other vectors related to (3) REQUEST_URI.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Omer Singer · textwebappsphp
https://www.exploit-db.com/exploits/30733

References (17)

Core 17
Core References
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2007/3535
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/27246
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/37292
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/27506
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/26301
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2007/dsa-1403
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/37939
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDKSA-2007:199
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/27595
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=333661
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29323

Scores

EPSS 0.1142
EPSS Percentile 93.6%

Details

CWE
CWE-79
Status published
Products (1)
phpmyadmin/phpmyadmin < 2.11.1.1
Published Oct 19, 2007
Tracked Since Feb 18, 2026