#VU44862 Path traversal in phpMyAdmin


Published: 2011-08-01 | Updated: 2020-08-11

Vulnerability identifier: #VU44862

Vulnerability risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:U/RC:C]

CVE-ID: CVE-2011-2643

CWE-ID: CWE-22

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
phpMyAdmin
Web applications / Remote management & hosting panels

Vendor: phpMyAdmin

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in sql.php in phpMyAdmin 3.4.x before 3.4.3.2, when configuration storage is enabled,. A remote authenticated attacker can send a specially crafted HTTP request and remote attackers to include and execute arbitrary local files via directory traversal sequences in a MIME-type transformation parameter.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

phpMyAdmin: 3.4.0.0 - 3.4.3.1


External links
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html
http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=f63e1bb42a37401b2fdfcd2e66cce92b7ea2025c
http://secunia.com/advisories/45365
http://secunia.com/advisories/45515
http://www.mandriva.com/security/advisories?name=MDVSA-2011:124
http://www.phpmyadmin.net/home_page/security/PMASA-2011-10.php
http://www.securityfocus.com/bid/48874
http://bugzilla.redhat.com/show_bug.cgi?id=725382
http://exchange.xforce.ibmcloud.com/vulnerabilities/68767


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability