Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: Version 3.3.0 and all versions below
Vulnerability Type: Cross-Site Scripting vulnerability
Severity: low
Problem Description: Failing to filter user input the extension is susceptible to Cross-Site Scripting making it possible to execute arbitrary JavaScript. The vendor claims that users with Microsoft Internet Explorer are mainly vulnerable.
Solution: An updated version 3.4.0 is available from the TYPO3 extension manager and at typo3.org/extensions/repository/view/phpmyadmin/3.4.0/. Users of the extension are advised to update the extension as soon as possible.
General advice: Follow the recommendations that are given in the TYPO3 SECURITY Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.
Credits: Credits go to Masako Oono who found the issue in phpMyAdmin. Furthermore the TYPO3 Security Team wishes to thank the extension maintainer Andreas Kundoch for fixing the issue by upgrading phpMyAdmin to the latest stable version.