Path traversal in phpMyAdmin - CVE-2011-2643

 

Path traversal in phpMyAdmin - CVE-2011-2643

Published: August 1, 2011 / Updated: August 11, 2020


Vulnerability identifier: #VU44862
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2011-2643
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: phpMyAdmin
Affected software:
phpMyAdmin

Detailed vulnerability description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in sql.php in phpMyAdmin 3.4.x before 3.4.3.2, when configuration storage is enabled,. A remote authenticated attacker can send a specially crafted HTTP request and remote attackers to include and execute arbitrary local files via directory traversal sequences in a MIME-type transformation parameter.


How to mitigate CVE-2011-2643

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Sources