Announcement-ID: PMASA-2016-15
Date: 2016-05-25
Updated: 2016-05-26
File Traversal Protection Bypass on Error Reporting
A specially crafted payload could result in the error reporting component exposing whether an arbitrary file exists on the file system and the size of that file.
The attacker must be able to intercept and modify the user's POST data and must be able to trigger a JavaScript error to the user.
Updated to include CVE ID.
We consider this to be non-critical.
This attack can be mitigated in affected installations by setting `$cfg['Servers'][$i]['SendErrorReports'] = 'never';`. Upgrading to a more recent development commit is suggested.
Git 'master' development branch. No released version was vulnerable.
All released versions are not affected as they use precalculated data.
Upgrade to a more recent snapshot or release version.
This issue was found thanks to Mozilla SOS program.
Assigned CVE ids: CVE-2016-5098
CWE ids: CWE-661
The following commits have been made on the 4.6 branch to fix this issue:
For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.