A cross-site scripting (XSS) flaw was found in the way specific routine to display the records returned by the SQL query of phpMyAdmin, a tool written in PHP intended to handle the administration of MySQL over the World Wide Web, used to sanitize output of the SQL query. A remote attacker could provide a specially-crafted web page that, when visited by a phpMyAdmin user would lead to arbitrary HTML or web script execution in the context of phpMyAdmin's user session.
 https://github.com/phpmyadmin/phpmyadmin/commit/56e9ede5223219cef2187ced385924ef2e0ae21d (against master)
 https://github.com/phpmyadmin/phpmyadmin/commit/01d35b3558e47fba947719857bd71f6fd9e5dce8 (against 3.5.x)
This issue affects the latest version of the phpMyAdmin package, as shipped with Fedora release of 18, 19, and Fedora EPEL 6. Please schedule an update.
This issue did not affect the latest version of the phpMyAdmin package, as shipped with Fedora EPEL-5.
Created phpMyAdmin tracking bugs for this issue:
Affects: fedora-all [bug 989678]
Affects: epel-6 [bug 989679]
The CVE identifier of CVE-2013-4995 has been assigned to this issue: