Regular expression quoting issue in Synchronize code.
Through a possible bug in PHP, a null byte can truncate the pattern string allowing an attacker to inject the /e modifier causing the preg_replace function to execute its second argument as PHP code.
We consider this vulnerability to be serious.
All PHP versions that were current at the time of the advisory (5.3.6, 5.2.17) on all OS are vulnerable, unless the Suhosin patch has been installed. An attacker must be logged in via phpMyAdmin to exploit this problem.
The 3.4.3 and earlier versions are affected.
Branch 2.11.x is not affected by this.
Upgrade to phpMyAdmin 126.96.36.199 or 188.8.131.52 or apply the related patch listed below.
Assigned CVE ids: CVE-2011-2507
CWE ids: CWE-661
The following commits have been made to fix this issue:
The following commits have been made on the 3.3 branch to fix this issue:
For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.