An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication). Gentoo Security Scout Florian Schuhmacher
dev-db/phpmyadmin: Security bump to release 4.8.2 - fixes bug 658742. Fixes security issues PMASA-2018-3 and PMASA-2018-4. dev-db/phpmyadmin: Remvoe vulnerable versions.
@arch teams, please add stable keywords to =dev-db/phpmyadmin-4.8.2 Desired keywords: =dev-db/phpmyadmin-4.8.2 KEYWORDS="alpha amd64 ~arm ~hppa ~ia64 ppc ppc64 ~sparc x86 ~x86-fbsd ~ppc-macos ~x64-macos ~x86-macos"
@sparc: Not sure if you want to keep stable keywords or not.
New GLSA Request filed.
This issue was resolved and addressed in GLSA 201904-16 at https://security.gentoo.org/glsa/201904-16 by GLSA coordinator Aaron Bauman (b-man).