Global variables overwrite in "export.php".
The export script generates global variables from those present in the $$_POST superglobal. This may lead to other exploits in the export script.
We consider this vulnerability to be serious.
This vulnerability can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users to access the required form.
phpMyAdmin versions 4.x (prior to 4.0.0-rc3).
Upgrade to phpMyAdmin 4.0.0-rc3 or newer.
Thanks to Janek Vind for reporting this issue.
Assigned CVE ids: CVE-2013-3241
CWE ids: CWE-661
For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.