XSS in export.
Using crafted url parameters, it was possible to produce XSS on the export panels in the server, database and table sections.
We consider these vulnerabilities to be non critical.
These attacks are unlikely to succeed on a victim. Moreover, all these attacks require that the user be already logged in and that a valid token be part of the request.
Versions 3.4.x are affected.
Upgrade to phpMyAdmin 3.4.9 or newer or apply the related patches listed below.
Thanks to Nils Juenemann for reporting a vulnerable url parameter.
Assigned CVE ids: CVE-2011-4780
The following commits have been made to fix this issue:
For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.