Directory traversal vulnerability in libraries/display_tbl.lib.php in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1, when a certain MIME transformation feature is enabled, allows remote authenticated users to include and execute arbitrary local files via a .. (dot dot) in a GLOBALS[mime_map][$meta->name][transformation] parameter.
http://www.xxor.se/advisories/phpMyAdmin_3.x_Multiple_Remote_Code_Executions.txt
http://www.securityfocus.com/archive/1/518804/100/0/threaded
http://www.phpmyadmin.net/home_page/security/PMASA-2011-8.php
http://www.openwall.com/lists/oss-security/2011/06/29/11
http://www.openwall.com/lists/oss-security/2011/06/28/8
http://www.openwall.com/lists/oss-security/2011/06/28/6
http://www.openwall.com/lists/oss-security/2011/06/28/2
http://www.mandriva.com/security/advisories?name=MDVSA-2011:124
http://www.debian.org/security/2011/dsa-2286
http://typo3.org/teams/security/security-bulletins/typo3-sa-2011-008/
http://securityreason.com/securityalert/8306
http://secunia.com/advisories/45315
http://secunia.com/advisories/45292
http://secunia.com/advisories/45139
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062719.html
Published: 2011-07-14
Updated: 2025-04-11
Base Score: 6
Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P
Severity: Medium
Base Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
Base Score: 7.4
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Severity: High