Bringing MySQL to the web


Announcement-ID: PMASA-2011-7

Date: 2011-07-02

Updated: 2011-07-04


Regular expression quoting issue in Synchronize code.


Through a possible bug in PHP, a null byte can truncate the pattern string allowing an attacker to inject the /e modifier causing the preg_replace function to execute its second argument as PHP code.


We consider this vulnerability to be serious.

Mitigation factor

All PHP versions that were current at the time of the advisory (5.3.6, 5.2.17) on all OS are vulnerable, unless the Suhosin patch has been installed. An attacker must be logged in via phpMyAdmin to exploit this problem.

Affected Versions

The 3.4.3 and earlier versions are affected.

Unaffected Versions

Branch 2.11.x is not affected by this.


Upgrade to phpMyAdmin or or apply the related patch listed below.


This issue was found by Frans Pehrson from Xxor AB. His advisory.

Assigned CVE ids: CVE-2011-2507

CWE ids: CWE-661


The following commits have been made to fix this issue:

The following commits have been made on the 3.3 branch to fix this issue:

More information

For further information and in case of questions, please contact the phpMyAdmin team. Our website is