A local file inclusion flaw was found in the way phpMyAdmin, the MySQL over WWW administration tool, performed particular SQL query execution. A local attacker could use this flaw to obtain sensitive information via specially-crafted MIME-type transformation parameter. References: [1] http://www.phpmyadmin.net/home_page/security/PMASA-2011-10.php [2] http://www.phpmyadmin.net/home_page/news.php Upstream patches: [3] http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commitdiff;h=f63e1bb42a37401b2fdfcd2e66cce92b7ea2025c Versions affected: Versions 3.4.0 to 3.4.3.1 are affected. Further flaw exploitation details: The phpMyAdmin's configuration storage mechanism must be configured for this attack to work.
This issue affects the versions of the phpMyAdmin package, as shipped with Fedora release of 14 and 15. Please schedule an update. -- This issue affects the version of the phpMyAdmin package, as present within EPEL-6 repository. Please schedule an update. -- This issue did NOT affect the versions of the phpMyAdmin package, as present within EPEL-4 and EPEL-5 repositories.
Created phpMyAdmin tracking bugs for this issue Affects: fedora-all [bug 725385] Affects: epel-6 [bug 725386]