CVE-2013-3239

Published: 26 April 2013

phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename.

Priority

Low

Status

Package Release Status
phpmyadmin
Launchpad, Ubuntu, Debian
Upstream
Released (4:3.4.11.1-2)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(4:3.5.8.1-1)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable
(4:3.5.8.1-1)

Notes

AuthorNote
jdstrand
per Debian, Requires non-default option saveDir to be enabled, an
authenticated untrusted user and Apache mod_mime

References