XSS due to unescaped HTML output in GIS visualisation page.
When modifying a URL parameter with a crafted value it is possible to trigger an XSS.
We consider this vulnerability to be non critical.
These XSS can only be triggered when a valid database is known and when a valid cookie token is used.
Versions 3.5.x are affected.
Upgrade to phpMyAdmin 3.5.8 or newer or apply the patches listed below.
Thanks to Janek Vind for reporting this issue.
Assigned CVE ids: CVE-2013-1937
The following commits have been made to fix this issue:
For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.