Miggo Logo

CVE-2017-1000015: phpMyAdmin CSS Injection Vulnerability

6.1

CVSS Score
3.0

Basic Information

EPSS Score
0.683%
Published
5/14/2022
Updated
10/31/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
phpmyadmin/phpmyadmincomposer>= 4.6.0, < 4.6.64.6.6
phpmyadmin/phpmyadmincomposer>= 4.4.0, < 4.4.15.104.4.15.10
phpmyadmin/phpmyadmincomposer>= 4.0.0, < 4.0.10.194.0.10.19

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper handling of cookie parameters used in theme selection. The advisory explicitly references theme-related commits (3a62476, bd3677f, 8a08162) across branches, which focus on input validation for theme names. These functions are central to cookie-based theme selection and CSS resource loading. The CWE-79 classification confirms the XSS-like pattern of injecting untrusted input into web page generation (in this case, CSS context). The high confidence comes from the direct correlation between the vulnerability description (CSS injection via cookies), the patched commits targeting theme handling, and the standard phpMyAdmin architecture where ThemeManager handles these operations.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

p*pMy**min *.*, *.*, *n* *.* *r* vuln*r**l* to * *SS inj**tion *tt**k t*rou** *r**t** *ooki* p*r*m*t*rs

Reasoning

T** vuln*r**ility st*ms *rom improp*r **n*lin* o* *ooki* p*r*m*t*rs us** in t**m* s*l**tion. T** **visory *xpli*itly r***r*n**s t**m*-r*l*t** *ommits (*******, *******, *******) **ross *r*n***s, w*i** *o*us on input v*li**tion *or t**m* n*m*s. T**s*