Vulnerability identifier: #VU44863
Vulnerability risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-22
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
phpMyAdmin
Web applications /
Remote management & hosting panels
Vendor: phpMyAdmin
Description
The vulnerability allows a remote #AU# to read and manipulate data.
Multiple directory traversal vulnerabilities in the relational schema implementation in phpMyAdmin 3.4.x before 3.4.3.2 allow remote authenticated users to include and execute arbitrary local files via directory traversal sequences in an export type field, related to (1) libraries/schema/User_Schema.class.php and (2) schema_export.php.
Mitigation
Install update from vendor's website.
Vulnerable software versions
phpMyAdmin: 3.4.0.0 - 3.4.3.1
External links
https://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html
https://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html
https://osvdb.org/74111
https://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=3ae58f0cd6b89ad4767920f9b214c38d3f6d4393
https://secunia.com/advisories/45365
https://secunia.com/advisories/45515
https://www.mandriva.com/security/advisories?name=MDVSA-2011:124
https://www.openwall.com/lists/oss-security/2011/07/25/4
https://www.openwall.com/lists/oss-security/2011/07/26/10
https://www.phpmyadmin.net/home_page/security/PMASA-2011-11.php
https://www.securityfocus.com/bid/48874
https://bugzilla.redhat.com/show_bug.cgi?id=725383
https://exchange.xforce.ibmcloud.com/vulnerabilities/68768
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.