A cross-site scripting (XSS) flaw was found in the way phpMyAdmin, a tool written in PHP intended to handle the administration of MySQL over the World Wide Web, previously used to sanitize HTML output when exporting the schema. Remote attacker could provide a specially-crafted web page that, when visited by phpMyAdmin user would lead to arbitrary HTML or web script execution in the context of phpMyAdmin's user session. Upstream advisory: [1] http://www.phpmyadmin.net/home_page/security/PMASA-2013-14.php Relevant patches: [2] https://github.com/phpmyadmin/phpmyadmin/commit/1293e9b6e9eb7a831c5738f346ea44dee6d1bf0f (master) [3] https://github.com/phpmyadmin/phpmyadmin/commit/dede065d7ad59fb7c31ae384961564b7f7a7c005 (3.5.x)
This issue affects the latest version of the phpMyAdmin package, as shipped with Fedora release of 18, 19, and Fedora EPEL 6. Please schedule an update. -- This issue did not affect the latest version of the phpMyAdmin package, as shipped with Fedora EPEL-5.
Created phpMyAdmin tracking bugs for this issue: Affects: fedora-all [bug 989678] Affects: epel-6 [bug 989679]
The CVE identifier of CVE-2013-5002 has been assigned to this issue: http://www.openwall.com/lists/oss-security/2013/07/30/1