A security flaw was found in the way JSON file to be retrieved version check functionality of phpMyAdmin, a tool written in PHP intended to handle the administration of MySQL over the World Wide Web, previously used to validate content of the retrieved JSON file. A remote attacker could provide a specially-crafted JSON format file that, when accepted (and processed) by the phpMyAdmin's user session would lead to arbitrary HTML or web script execution in the context of phpMyAdmin's user session. Upstream advisory: [1] http://www.phpmyadmin.net/home_page/security/PMASA-2013-11.php Relevant patches: [2] https://github.com/phpmyadmin/phpmyadmin/commit/b9c814ed6d59733c54965e01e90ffd5d3348fd2c (master) [3] https://github.com/phpmyadmin/phpmyadmin/commit/333d82d3271b2a1b445134bb6bbb15ae8c9ba8a6 (3.5.x)
This issue affects the latest version of the phpMyAdmin package, as shipped with Fedora release of 18, 19, and Fedora EPEL 6. Please schedule an update. -- This issue did not affect the latest version of the phpMyAdmin package, as shipped with Fedora EPEL-5.
Created phpMyAdmin tracking bugs for this issue: Affects: fedora-all [bug 989678] Affects: epel-6 [bug 989679]
*** This bug has been marked as a duplicate of bug 989657 ***