Directory traversal vulnerability in sql.php in phpMyAdmin 3.4.x before 3.4.3.2, when configuration storage is enabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in a MIME-type transformation parameter.
lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html
lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html
phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=f63e1bb42a37401b2fdfcd2e66cce92b7ea2025c
secunia.com/advisories/45365
secunia.com/advisories/45515
www.mandriva.com/security/advisories?name=MDVSA-2011:124
www.phpmyadmin.net/home_page/security/PMASA-2011-10.php
www.securityfocus.com/bid/48874
bugzilla.redhat.com/show_bug.cgi?id=725382
exchange.xforce.ibmcloud.com/vulnerabilities/68767