An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web servers user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of options(MYSQLI_OPT_LOCAL_INFILE calls.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Phpmyadmin | Phpmyadmin | 4.0.0 (including) | 4.8.4 (including) |
Phpmyadmin | Ubuntu | bionic | * |
Phpmyadmin | Ubuntu | cosmic | * |
Phpmyadmin | Ubuntu | disco | * |
Phpmyadmin | Ubuntu | esm-apps/xenial | * |
Phpmyadmin | Ubuntu | esm-infra-legacy/trusty | * |
Phpmyadmin | Ubuntu | trusty | * |
Phpmyadmin | Ubuntu | trusty/esm | * |
Phpmyadmin | Ubuntu | upstream | * |
Phpmyadmin | Ubuntu | xenial | * |