<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for phpMyAdmin</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:1556-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-06-11T16:20:43Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-06-11T16:20:43Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-06-11T16:20:43Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for phpMyAdmin</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This phpMyAdmin update to version 4.4.15.6 fixes the following issues:

Security issues fixed:
- PMASA-2016-16 (CVE-2016-5099, CWE-661):
   Self XSS, see
    https://www.phpmyadmin.net/security/PMASA-2016-16/
- PMASA-2016-15 (CVE-2016-5098, CWE-661):
   File Traversal Protection Bypass on Error Reporting, see
    https://www.phpmyadmin.net/security/PMASA-2016-15/
- PMASA-2016-14 (CVE-2016-5097, CWE-661):
   Sensitive Data in URL GET Query Parameters, see
    https://www.phpmyadmin.net/security/PMASA-2016-14/
  </Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2016-06/msg00043.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:1556-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="phpMyAdmin-4.4.15.6-57.1">
      <FullProductName ProductID="phpMyAdmin-4.4.15.6-57.1">phpMyAdmin-4.4.15.6-57.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">phpMyAdmin before 4.6.2 places tokens in query strings and does not arrange for them to be stripped before external navigation, which allows remote attackers to obtain sensitive information by reading (1) HTTP requests or (2) server logs.</Note>
    </Notes>
    <CVE>CVE-2016-5097</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-06/msg00043.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5097.html</URL>
        <Description>CVE-2016-5097</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982126</URL>
        <Description>SUSE Bug 982126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982128</URL>
        <Description>SUSE Bug 982128</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in libraries/error_report.lib.php in phpMyAdmin before 4.6.2-prerelease allows remote attackers to determine the existence of arbitrary files by triggering an error.</Note>
    </Notes>
    <CVE>CVE-2016-5098</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-06/msg00043.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5098.html</URL>
        <Description>CVE-2016-5098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982127</URL>
        <Description>SUSE Bug 982127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982128</URL>
        <Description>SUSE Bug 982128</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cross-site scripting (XSS) vulnerability in phpMyAdmin 4.4.x before 4.4.15.6 and 4.6.x before 4.6.2 allows remote attackers to inject arbitrary web script or HTML via special characters that are mishandled during double URL decoding.</Note>
    </Notes>
    <CVE>CVE-2016-5099</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-06/msg00043.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5099.html</URL>
        <Description>CVE-2016-5099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982126</URL>
        <Description>SUSE Bug 982126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982128</URL>
        <Description>SUSE Bug 982128</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
