Synopsis
The remote web server hosts a PHP application that is affected by multiple vulnerabilities.
Description
According to its self-reported version number, the phpMyAdmin application hosted on the remote web server is 4.0.x prior to 4.0.10.6, 4.1.x prior to 4.1.14.7, or 4.2.x prior to 4.2.12. It is, therefore, affected by the following vulnerabilities :
  - A cross-site scripting vulnerability in the zoom search     page due to improper validation of input when handling     an ENUM value before returning it to the user. A remote     attacker, with a specially crafted request, could     potentially execute arbitrary script code within the     browser / server trust relationship. (CVE-2014-8958)
  - A cross-site scripting vulnerability in the home page     due to improper validation of input when handling a font     size before returning it to the user. A remote attacker,     with a specially crafted request, could potentially     execute arbitrary script code within the browser /     server trust relationship. (CVE-2014-8958)
  - A cross-site scripting vulnerability in the print view     page due to improper validation of input when handling     an ENUM value before returning it to the user. A remote     attacker, with a specially crafted request, could     potentially execute arbitrary script code within the     browser / server trust relationship. (CVE-2014-8958)
  - A cross-site scripting vulnerability in the table browse     page due to improper validation of input when handling     database, table, and column names before returning them     to the user. A remote attacker, with a specially crafted     request, could potentially execute arbitrary script code     within the browser / server trust relationship.
    (CVE-2014-8958)
  - A local file inclusion vulnerability in the GIS editor     feature due to improperly validation of a parameter used     to specify the geometry type. This could allow a remote,     authenticated attacker to include arbitrary files from     the host, allowing disclosure of the file contents or     the execution of scripts on the host. (CVE-2014-8959)
  - A cross-site scripting vulnerability in the error     reporting page due to improper validation of filenames     before returning them to the user. This could allow a     remote attacker, with a specially crafted request, to     potentially execute arbitrary script code within the     browser / server trust relationship. (CVE-2014-8960)
  - An information disclosure vulnerability in the error     reporting feature due to improper validation of     user-supplied input. This could allow a remote,     authenticated attacker to determine a file's line count.
    (CVE-2014-8961)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade to phpMyAdmin 4.0.10.6 / 4.1.14.7 / 4.2.12 or later, or apply the patches referenced in the vendor advisory.
Plugin Details
File Name: phpmyadmin_pmasa_2014_16.nasl
Configuration: Enable paranoid mode, Enable thorough checks (optional)
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P
Vulnerability Information
CPE: cpe:/a:phpmyadmin:phpmyadmin
Required KB Items: www/PHP, Settings/ParanoidReport, installed_sw/phpMyAdmin
Exploit Ease: No exploit is required
Patch Publication Date: 11/20/2014
Vulnerability Publication Date: 11/20/2014
Reference Information
CVE: CVE-2014-8958, CVE-2014-8959, CVE-2014-8960, CVE-2014-8961
BID: 71243, 71244, 71245, 71247
CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990