phpMyAdmin Security Advisory
phpMyAdmin is a very popular and widely-used MySQL Database Management system.
A new security advisory was released by the software developers addressing several critical security findings. These are outlined below:
Local file inclusion through transformation feature
A flaw has been found where an attacker can exploit phpMyAdmin to leak the contents of a local file. The attacker must have access to the phpMyAdmin Configuration Storage tables, although these can easily be created in any database to which the attacker has access. An attacker must have valid credentials to log in to phpMyAdmin; this vulnerability does not allow an attacker to circumvent the login system.
We consider this vulnerability to be severe.
XSRF/CSRF vulnerability in phpMyAdmin
By deceiving a user to click on a crafted URL, it is possible to perform harmful SQL operations such as renaming databases, creating new tables/routines, deleting designer pages, adding/deleting users, updating user passwords, killing SQL processes, etc.
We consider this vulnerability to be of moderate severity.
XSS vulnerability in navigation tree
A Cross-Site Scripting vulnerability was found in the navigation tree, where an attacker can deliver a payload to a user through a specially-crafted database/table name.
We consider this attack to be of moderate severity.
Please update the software ASAP or take additional appropriate steps to mitigate the possibility of these vulnerabilities being exploited.