CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
90.4%
Directory traversal vulnerability in sql.php in phpMyAdmin 3.4.x before 3.4.3.2, when configuration storage is enabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in a MIME-type transformation parameter.
Vendor | Product | Version | CPE |
---|---|---|---|
phpmyadmin | phpmyadmin | 3.4.0.0 | cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.0.0:*:*:*:*:*:*:* |
phpmyadmin | phpmyadmin | 3.4.1.0 | cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.1.0:*:*:*:*:*:*:* |
phpmyadmin | phpmyadmin | 3.4.2.0 | cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.2.0:*:*:*:*:*:*:* |
phpmyadmin | phpmyadmin | 3.4.3.0 | cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.0:*:*:*:*:*:*:* |
phpmyadmin | phpmyadmin | 3.4.3.1 | cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.1:*:*:*:*:*:*:* |
lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html
lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html
phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=f63e1bb42a37401b2fdfcd2e66cce92b7ea2025c
secunia.com/advisories/45365
secunia.com/advisories/45515
www.mandriva.com/security/advisories?name=MDVSA-2011:124
www.phpmyadmin.net/home_page/security/PMASA-2011-10.php
www.securityfocus.com/bid/48874
bugzilla.redhat.com/show_bug.cgi?id=725382
exchange.xforce.ibmcloud.com/vulnerabilities/68767