Vulnerability identifier: #VU44862
Vulnerability risk: Medium
CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:U/RC:C]
CVE-ID:
CWE-ID:
CWE-22
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
phpMyAdmin
Web applications /
Remote management & hosting panels
Vendor: phpMyAdmin
Description
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in sql.php in phpMyAdmin 3.4.x before 3.4.3.2, when configuration storage is enabled,. A remote authenticated attacker can send a specially crafted HTTP request and remote attackers to include and execute arbitrary local files via directory traversal sequences in a MIME-type transformation parameter.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versions
phpMyAdmin: 3.4.0.0 - 3.4.3.1
External links
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html
http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=f63e1bb42a37401b2fdfcd2e66cce92b7ea2025c
http://secunia.com/advisories/45365
http://secunia.com/advisories/45515
http://www.mandriva.com/security/advisories?name=MDVSA-2011:124
http://www.phpmyadmin.net/home_page/security/PMASA-2011-10.php
http://www.securityfocus.com/bid/48874
http://bugzilla.redhat.com/show_bug.cgi?id=725382
http://exchange.xforce.ibmcloud.com/vulnerabilities/68767
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.