Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce: phpMyAdmin, Cross Site Scripting via nul

September 2008 by Vigil@nce

An attacker can use the nul character in order to bypass the anti
Cross Site Scripting security of phpMyAdmin.

 Gravity: 2/4
 Consequences: client access/rights
 Provenance: document
 Means of attack: 1 attack
 Ability of attacker: technician (2/4)
 Confidence: confirmed by the editor (5/5)
 Diffusion of the vulnerable configuration: high (3/3)
 Creation date: 23/09/2008

IMPACTED PRODUCTS

 Fedora
 Unix - plateform

DESCRIPTION

The Internet Explorer browser ignores nul (’\0’) characters
located inside a HTML document. For example:

hello
is interpreted as:

hello

The js_escape.lib.php library of phpMyAdmin filters the JavaScript
code contained in HTML documents. The PMA_escapeJsString()
function handles the "

" final tag. However, if this tag
contains a nul character, it is not recognized.

An attacker can therefore use the nul character in order to bypass
the anti Cross Site Scripting security.

CHARACTERISTICS

 Identifiers: BID-31327, FEDORA-2008-8286, FEDORA-2008-8335,
VIGILANCE-VUL-8125
 Url: http://vigilance.aql.fr/vulnerability/8125


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts