A cross-site scripting (XSS) flaw was found in the way specific routine to display the records returned by the SQL query of phpMyAdmin, a tool written in PHP intended to handle the administration of MySQL over the World Wide Web, used to sanitize output of the SQL query. A remote attacker could provide a specially-crafted web page that, when visited by a phpMyAdmin user would lead to arbitrary HTML or web script execution in the context of phpMyAdmin's user session. Upstream advisory: [1] http://www.phpmyadmin.net/home_page/security/PMASA-2013-8.php Relevant patches: [2] https://github.com/phpmyadmin/phpmyadmin/commit/56e9ede5223219cef2187ced385924ef2e0ae21d (against master) [3] https://github.com/phpmyadmin/phpmyadmin/commit/01d35b3558e47fba947719857bd71f6fd9e5dce8 (against 3.5.x)
This issue affects the latest version of the phpMyAdmin package, as shipped with Fedora release of 18, 19, and Fedora EPEL 6. Please schedule an update. -- This issue did not affect the latest version of the phpMyAdmin package, as shipped with Fedora EPEL-5.
Created phpMyAdmin tracking bugs for this issue: Affects: fedora-all [bug 989678] Affects: epel-6 [bug 989679]
The CVE identifier of CVE-2013-4995 has been assigned to this issue: http://www.openwall.com/lists/oss-security/2013/07/30/1