First published: Mon Jul 25 2011(Updated: )
A local file inclusion flaw was found in the way phpMyAdmin, the MySQL over WWW administration tool, performed particular SQL query execution. A local attacker could use this flaw to obtain sensitive information via specially-crafted MIME-type transformation parameter. References: [1] <a href="http://www.phpmyadmin.net/home_page/security/PMASA-2011-10.php">http://www.phpmyadmin.net/home_page/security/PMASA-2011-10.php</a> [2] <a href="http://www.phpmyadmin.net/home_page/news.php">http://www.phpmyadmin.net/home_page/news.php</a> Upstream patches: [3] <a href="http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commitdiff;h=f63e1bb42a37401b2fdfcd2e66cce92b7ea2025c">http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commitdiff;h=f63e1bb42a37401b2fdfcd2e66cce92b7ea2025c</a> Versions affected: Versions 3.4.0 to 3.4.3.1 are affected. Further flaw exploitation details: The phpMyAdmin's configuration storage mechanism must be configured for this attack to work.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
phpMyAdmin phpMyAdmin | =3.4.0.0 | |
phpMyAdmin phpMyAdmin | =3.4.3.1 | |
phpMyAdmin phpMyAdmin | =3.4.1.0 | |
phpMyAdmin phpMyAdmin | =3.4.2.0 | |
phpMyAdmin phpMyAdmin | =3.4.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.