The register_globals emulation layer in grab_globals.php for phpMyAdmin before 2.6.4-pl3 does not perform safety checks on values in the _FILES array for uploaded files, which allows remote attackers to include arbitrary files by using direct requests to library scripts that do not use grab_globals.php, then modifying certain configuration values for the theme.
https://exchange.xforce.ibmcloud.com/vulnerabilities/22835
http://www.securityfocus.com/bid/15169
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5
http://www.novell.com/linux/security/advisories/2005_66_phpmyadmin.html
http://www.novell.com/linux/security/advisories/2005_28_sr.html
http://www.hardened-php.net/advisory_162005.73.html
http://www.gentoo.org/security/en/glsa/glsa-200510-21.xml
http://www.debian.org/security/2005/dsa-880
http://securitytracker.com/id?1015091
http://secunia.com/advisories/17607
http://secunia.com/advisories/17559
http://secunia.com/advisories/17337
http://secunia.com/advisories/17289/
http://marc.info/?l=bugtraq&m=113017591414699&w=2
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0478.