Directory traversal vulnerability in bs_disp_as_mime_type.php in the BLOB streaming feature in phpMyAdmin before 3.1.3.1 allows remote attackers to read arbitrary files via directory traversal sequences in the file_path parameter ($filename variable).
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_3_1_3/phpMyAdmin/bs_disp_as_mime_type.php?r1=12303&r2=12302&pathrev=12303 | |
http://secunia.com/advisories/34642 | third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html | vendor advisory |
http://secunia.com/advisories/34468 | third party advisory |
http://www.phpmyadmin.net/home_page/security/PMASA-2009-1.php | patch vendor advisory |