Directory traversal vulnerability in bs_disp_as_mime_type.php in the BLOB streaming feature in phpMyAdmin before 3.1.3.1 allows remote attackers to read arbitrary files via directory traversal sequences in the file_path parameter ($filename variable).
lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_3_1_3/phpMyAdmin/bs_disp_as_mime_type.php?r1=12303&r2=12302&pathrev=12303
secunia.com/advisories/34468
secunia.com/advisories/34642
www.phpmyadmin.net/home_page/security/PMASA-2009-1.php