A cross-site scripting (XSS) flaw was found in the way phpMyAdmin, a tool written in PHP intended to handle the administration of MySQL over the World Wide Web, previously used to sanitize HTML output when exporting the schema. Remote attacker could provide a specially-crafted web page that, when visited by phpMyAdmin user would lead to arbitrary HTML or web script execution in the context of phpMyAdmin's user session.
 https://github.com/phpmyadmin/phpmyadmin/commit/1293e9b6e9eb7a831c5738f346ea44dee6d1bf0f (master)
 https://github.com/phpmyadmin/phpmyadmin/commit/dede065d7ad59fb7c31ae384961564b7f7a7c005 (3.5.x)
This issue affects the latest version of the phpMyAdmin package, as shipped with Fedora release of 18, 19, and Fedora EPEL 6. Please schedule an update.
This issue did not affect the latest version of the phpMyAdmin package, as shipped with Fedora EPEL-5.
Created phpMyAdmin tracking bugs for this issue:
Affects: fedora-all [bug 989678]
Affects: epel-6 [bug 989679]
The CVE identifier of CVE-2013-5002 has been assigned to this issue: