An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server’s user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of “options(MYSQLI_OPT_LOCAL_INFILE” calls.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | phpmyadmin | < 4:4.9.1+dfsg1-2 | phpmyadmin_4:4.9.1+dfsg1-2_all.deb |
Debian | 11 | all | phpmyadmin | < 4:4.9.1+dfsg1-2 | phpmyadmin_4:4.9.1+dfsg1-2_all.deb |
Debian | 999 | all | phpmyadmin | < 4:4.9.1+dfsg1-2 | phpmyadmin_4:4.9.1+dfsg1-2_all.deb |
Debian | 13 | all | phpmyadmin | < 4:4.9.1+dfsg1-2 | phpmyadmin_4:4.9.1+dfsg1-2_all.deb |