---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: MySQL HTML Output Script Insertion Security Issue SECUNIA ADVISORY ID: SA32072 VERIFY ADVISORY: http://secunia.com/advisories/32072/ CRITICAL: Not critical IMPACT: Cross Site Scripting WHERE: >From remote SOFTWARE: MySQL 5.x http://secunia.com/advisories/product/8355/ DESCRIPTION: Thomas Henlich has reported a security issue in MySQL, which can be exploited by malicious people to conduct script insertion attacks. The security issue is caused due to the MySQL command line client not properly sanitising HTML output. This can be exploited to execute arbitrary HTML and script code in a MySQL user's browser session by e.g. tricking the user into generating and viewing the HTML output of malicious database entries. Successful exploitation requires that the attacker can insert HTML or script code into the database and the victim generates HTML output of malicious data and views the resulting file in a browser. The security issue is reported in versions 5.0.26, 5.0.37, and 5.0.45. Other versions may also be affected. SOLUTION: Do not generate HTML output for databases containing potentially untrusted values. PROVIDED AND/OR DISCOVERED BY: Thomas Henlich ORIGINAL ADVISORY: MySQL Bug #27884: http://bugs.mysql.com/bug.php?id=27884 Thomes Henlich: http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------