Miggo Logo

CVE-2014-7217: phpMyAdmin cross-site scripting Vulnerability via ENUM value

3.5

CVSS Score

Basic Information

EPSS Score
0.52653%
Published
5/17/2022
Updated
8/16/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
AV:N/AC:M/Au:S/C:N/I:P/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
phpmyadmin/phpmyadmincomposer>= 4.0.0, < 4.0.10.44.0.10.4
phpmyadmin/phpmyadmincomposer>= 4.1.0, < 4.1.14.54.1.14.5
phpmyadmin/phpmyadmincomposer>= 4.2.0, < 4.2.9.14.2.9.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unescaped ENUM values in HTML output. The patches (304fb2b and c1a3f85) explicitly add htmlspecialchars() to sanitize $properties['type'], $column_type, and $printtype in these functions. These variables contained user-controlled ENUM values, and their lack of escaping in the original code allowed XSS payloads to execute when rendered in table search/structure pages.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Multipl* *ross-sit* s*riptin* (XSS) vuln*r**iliti*s in p*pMy**min *.*.x ***or* *.*.**.*, *.*.x ***or* *.*.**.*, *n* *.*.x ***or* *.*.*.* *llow r*mot* *ut**nti**t** us*rs to inj**t *r*itr*ry w** s*ript or *TML vi* * *r**t** *NUM v*lu* t**t is improp*r

Reasoning

T** vuln*r**ility st*ms *rom un*s**p** *NUM v*lu*s in *TML output. T** p*t***s (******* *n* *******) *xpli*itly *** `*tmlsp**i*l***rs()` to s*nitiz* $prop*rti*s['typ*'], $*olumn_typ*, *n* $printtyp* in t**s* *un*tions. T**s* v*ri**l*s *ont*in** us*r-