Path traversal in phpMyAdmin - CVE-2011-2508
Published: July 15, 2011 / Updated: August 11, 2020
phpMyAdmin
Detailed vulnerability description
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in libraries/display_tbl.lib.php in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1, when a certain MIME transformation feature is enabled,. A remote authenticated attacker can send a specially crafted HTTP request and remote authenticated users to include and execute arbitrary local files via a . (dot dot) in a GLOBALS[mime_map][$meta->name][transformation] parameter.
How to mitigate CVE-2011-2508
Sources
- http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062719.html
- http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=b434320eff8ca9c2fc1b043c1804f868341af9a7
- http://secunia.com/advisories/45139
- http://secunia.com/advisories/45292
- http://secunia.com/advisories/45315
- http://securityreason.com/securityalert/8306
- http://typo3.org/teams/security/security-bulletins/typo3-sa-2011-008/
- http://www.debian.org/security/2011/dsa-2286
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:124
- http://www.openwall.com/lists/oss-security/2011/06/28/2
- http://www.openwall.com/lists/oss-security/2011/06/28/6
- http://www.openwall.com/lists/oss-security/2011/06/28/8
- http://www.openwall.com/lists/oss-security/2011/06/29/11
- http://www.osvdb.org/73614
- http://www.phpmyadmin.net/home_page/security/PMASA-2011-8.php
- http://www.securityfocus.com/archive/1/518804/100/0/threaded
- http://www.xxor.se/advisories/phpMyAdmin_3.x_Multiple_Remote_Code_Executions.txt