Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200510-16] phpMyAdmin: Local file inclusion vulnerability

Vulnerability Assessment Details

[GLSA-200510-16] phpMyAdmin: Local file inclusion vulnerability

Vulnerability Assessment Summary
phpMyAdmin: Local file inclusion vulnerability

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200510-16
(phpMyAdmin: Local file inclusion vulnerability)

Maksymilian Arciemowicz reported that in
libraries/grab_globals.lib.php, the $__redirect parameter was not
correctly validated. Systems running PHP in safe mode are not affected.


A local attacker may exploit this vulnerability by sending
malicious requests, causing the execution of arbitrary code with the
rights of the user running the web server.


Run PHP in safe mode.


All phpMyAdmin users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.4_p2"

Network Security Threat Level: Medium

Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

White USB 2.0 2.5" HD Hard Drive Disk SATA External Enclosure Case Cover Box PC
White USB 2.0 2.5Seagate SV35.3 3.5" 750GB Internal 7200RPM 3.0 GB/s HDD Part #: ST3750330SV
Seagate SV35.3 3.5Western Digital 750gb 5400 RPM 2.5" SATA Laptop Hard Drive (WD7500BPVX)
Western Digital 750gb 5400 RPM 2.5Apple iMac 20" Desktop - All-In-One 500GB Hard drive, 2 GB Memory
Apple iMac 20


No Discussions have been posted on this vulnerability.