#VU44863 Path traversal in phpMyAdmin - CVE-2011-2718


| Updated: 2020-08-11

Vulnerability identifier: #VU44863

Vulnerability risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2011-2718

CWE-ID: CWE-22

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
phpMyAdmin
Web applications / Remote management & hosting panels

Vendor: phpMyAdmin

Description

The vulnerability allows a remote #AU# to read and manipulate data.

Multiple directory traversal vulnerabilities in the relational schema implementation in phpMyAdmin 3.4.x before 3.4.3.2 allow remote authenticated users to include and execute arbitrary local files via directory traversal sequences in an export type field, related to (1) libraries/schema/User_Schema.class.php and (2) schema_export.php.

Mitigation
Install update from vendor's website.

Vulnerable software versions

phpMyAdmin: 3.4.0.0 - 3.4.3.1


External links
https://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html
https://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html
https://osvdb.org/74111
https://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=3ae58f0cd6b89ad4767920f9b214c38d3f6d4393
https://secunia.com/advisories/45365
https://secunia.com/advisories/45515
https://www.mandriva.com/security/advisories?name=MDVSA-2011:124
https://www.openwall.com/lists/oss-security/2011/07/25/4
https://www.openwall.com/lists/oss-security/2011/07/26/10
https://www.phpmyadmin.net/home_page/security/PMASA-2011-11.php
https://www.securityfocus.com/bid/48874
https://bugzilla.redhat.com/show_bug.cgi?id=725383
https://exchange.xforce.ibmcloud.com/vulnerabilities/68768


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability