Multiple directory traversal vulnerabilities in the relational schema implementation in phpMyAdmin 3.4.x before 3.4.3.2 allow remote authenticated users to include and execute arbitrary local files via directory traversal sequences in an export type field, related to (1) libraries/schema/User_Schema.class.php and (2) schema_export.php.
lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html
lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html
osvdb.org/74111
phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=3ae58f0cd6b89ad4767920f9b214c38d3f6d4393
secunia.com/advisories/45365
secunia.com/advisories/45515
www.mandriva.com/security/advisories?name=MDVSA-2011:124
www.openwall.com/lists/oss-security/2011/07/25/4
www.openwall.com/lists/oss-security/2011/07/26/10
www.phpmyadmin.net/home_page/security/PMASA-2011-11.php
www.securityfocus.com/bid/48874
bugzilla.redhat.com/show_bug.cgi?id=725383
exchange.xforce.ibmcloud.com/vulnerabilities/68768