A local file inclusion and arbitrary SQL code execution flaws were found in the way phpMyAdmin, the MySQL over WWW administration tool, performed 'export_type' sanitization, when retrieving and verifying relation schema export options. A local attacker could use this flaw to obtain security sensitive information or, potentially, execute arbitrary SQL code with the privileges of the user running the query. References: [1] http://www.phpmyadmin.net/home_page/security/PMASA-2011-11.php [2] http://www.phpmyadmin.net/home_page/news.php Upstream patches: [3] http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commitdiff;h=3ae58f0cd6b89ad4767920f9b214c38d3f6d4393 Further flaw exploitation note: An attacker must be logged in via phpMyAdmin to exploit this problem. Affected versions: Versions 3.4.0 to 3.4.3.1 are affected.
This issue affects the versions of the phpMyAdmin package, as shipped with Fedora release of 14 and 15. Please schedule an update. -- This issue affects the version of the phpMyAdmin package, as present within EPEL-6 repository. Please schedule an update. -- This issue did NOT affect the versions of the phpMyAdmin package, as present within EPEL-4 and EPEL-5 repositories.
Created phpMyAdmin tracking bugs for this issue Affects: fedora-all [bug 725385] Affects: epel-6 [bug 725386]
CVE Request: [4] http://www.openwall.com/lists/oss-security/2011/07/25/4
This has been assigned the name CVE-2011-2718: http://www.openwall.com/lists/oss-security/2011/07/26/10