{ "schema_version": "1.4.0", "id": "GHSA-x7xh-qj32-6gv8", "modified": "2025-04-03T04:18:45Z", "published": "2022-05-01T02:16:26Z", "aliases": [ "CVE-2005-3300" ], "details": "The register_globals emulation layer in grab_globals.php for phpMyAdmin before 2.6.4-pl3 does not perform safety checks on values in the _FILES array for uploaded files, which allows remote attackers to include arbitrary files by using direct requests to library scripts that do not use grab_globals.php, then modifying certain configuration values for the theme.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3300" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22835" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0478." }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq&m=113017591414699&w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/17289" }, { "type": "WEB", "url": "http://secunia.com/advisories/17337" }, { "type": "WEB", "url": "http://secunia.com/advisories/17559" }, { "type": "WEB", "url": "http://secunia.com/advisories/17607" }, { "type": "WEB", "url": "http://securitytracker.com/id?1015091" }, { "type": "WEB", "url": "http://www.debian.org/security/2005/dsa-880" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-21.xml" }, { "type": "WEB", "url": "http://www.hardened-php.net/advisory_162005.73.html" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2005_28_sr.html" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2005_66_phpmyadmin.html" }, { "type": "WEB", "url": "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/15169" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-10-23T21:02:00Z" } }