XSS due to unescaped HTML Output when executing a SQL query.
Using a crafted SQL query, it was possible to produce an XSS on the SQL query form.
We consider these vulnerabilities to be non critical.
This vulnerability can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required form.
Versions 3.5.x (prior to 126.96.36.199) and 4.0.x (prior to 188.8.131.52) are affected.
Upgrade to phpMyAdmin 184.108.40.206 or 220.127.116.11 or newer or apply the patches listed below.
Thanks to Michał Bentkowski for reporting this issue.
Assigned CVE ids: CVE-2013-4995
The following commits have been made to fix this issue:
The following commits have been made on the 3.5 branch to fix this issue:
For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.