First published: Fri Apr 26 2013(Updated: )
phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/phpmyadmin/phpmyadmin | >=3.5.0<3.5.8.1 | 3.5.8.1 |
phpMyAdmin phpMyAdmin | =3.5.0.0 | |
phpMyAdmin phpMyAdmin | =3.5.1.0 | |
phpMyAdmin phpMyAdmin | =3.5.2.0 | |
phpMyAdmin phpMyAdmin | =3.5.2.1 | |
phpMyAdmin phpMyAdmin | =3.5.2.2 | |
phpMyAdmin phpMyAdmin | =3.5.3.0 | |
phpMyAdmin phpMyAdmin | =3.5.4 | |
phpMyAdmin phpMyAdmin | =3.5.5 | |
phpMyAdmin phpMyAdmin | =3.5.6 | |
phpMyAdmin phpMyAdmin | =3.5.7 | |
phpMyAdmin phpMyAdmin | =3.5.7-rc1 | |
phpMyAdmin phpMyAdmin | =3.5.8-rc1 | |
phpMyAdmin phpMyAdmin | =4.0.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.