Directory traversal vulnerability in sql.php in phpMyAdmin 3.4.x before 3.4.3.2, when configuration storage is enabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in a MIME-type transformation parameter.
https://exchange.xforce.ibmcloud.com/vulnerabilities/68767
https://bugzilla.redhat.com/show_bug.cgi?id=725382
http://www.securityfocus.com/bid/48874
http://www.phpmyadmin.net/home_page/security/PMASA-2011-10.php
http://www.mandriva.com/security/advisories?name=MDVSA-2011:124
http://secunia.com/advisories/45515
http://secunia.com/advisories/45365
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063418.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063410.html