Directory traversal vulnerability in sql.php in phpMyAdmin 3.4.x before 3.4.3.2, when configuration storage is enabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in a MIME-type transformation parameter.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.phpmyadmin.net/home_page/security/PMASA-2011-10.php | patch vendor advisory |
http://secunia.com/advisories/45515 | third party advisory |
http://secunia.com/advisories/45365 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/48874 | vdb entry |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:124 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68767 | vdb entry |
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=725382 | patch |
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html | vendor advisory |
http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=f63e1bb42a37401b2fdfcd2e66cce92b7ea2025c |