FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

phpMyAdmin -- File disclosure and SQL injection

Affected packages
phpMyAdmin < 4.8.5
phpMyAdmin-php56 < 4.8.5
phpMyAdmin-php70 < 4.8.5
phpMyAdmin-php71 < 4.8.5
phpMyAdmin-php72 < 4.8.5


VuXML ID 111aefca-2213-11e9-9c8d-6805ca0b3d42
Discovery 2019-01-21
Entry 2019-01-27

The phpMyAdmin development team reports:


Arbitrary file read vulnerability


When AllowArbitraryServer configuration set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access.

phpMyadmin attempts to block the use of LOAD DATA INFILE, but due to a bug in PHP, this check is not honored. Additionally, when using the 'mysql' extension, mysql.allow_local_infile is enabled by default. Both of these conditions allow the attack to occur.


We consider this vulnerability to be critical.

Mitigation factor

This attack can be mitigated by setting the `AllowArbitraryServer` configuration directive to false (which is the default value).

Affected Versions

phpMyAdmin versions from at least 4.0 through 4.8.4 are affected


SQL injection in Designer feature


A vulnerability was reported where a specially crafted username can be used to trigger an SQL injection attack through the designer feature.


We consider this vulnerability to be serious.

Affected Versions

phpMyAdmin versions from 4.5.0 through 4.8.4 are affected