Directory traversal vulnerability in bs_disp_as_mime_type.php in the BLOB streaming feature in phpMyAdmin before 3.1.3.1 allows remote attackers to read arbitrary files via directory traversal sequences in the file_path parameter ($filename variable).
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html - | |
References | () http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_3_1_3/phpMyAdmin/bs_disp_as_mime_type.php?r1=12303&r2=12302&pathrev=12303 - | |
References | () http://secunia.com/advisories/34468 - | |
References | () http://secunia.com/advisories/34642 - | |
References | () http://www.phpmyadmin.net/home_page/security/PMASA-2009-1.php - Patch, Vendor Advisory |
Information
Published : 2009-03-26 14:30
Updated : 2024-11-21 01:01
NVD link : CVE-2009-1148
Mitre link : CVE-2009-1148
CVE.ORG link : CVE-2009-1148
JSON object : View
Products Affected
phpmyadmin
- phpmyadmin
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')