Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: Version 4.11.2 and below
Vulnerability Type: Cross-Site Scripting, Local File Inclusion, Code Execution, Session Manipulation
References: PMASA-2011-9, PMASA-2011-10, PMASA-2011-11, PMASA-2011-12
Release Date: 25.07.2011
Via a crafted MIME-type transformation parameter, an attacker can perform a local file inclusion.
In the 'relational schema' code a parameter was not sanitized before being used to concatenate a class name.
It was possible to manipulate the PHP session superglobal using some of the Swekey authentication code. This is very similar to PMASA-2011-5 (TYPO3-SA-2011-008).
Solution: An updated version 4.11.3 is available from the TYPO3 extension manager and attypo3.org/extensions/repository/view/phpmyadmin/4.11.3/. Users of the extension are advised to update the extension as soon as possible.
The TYPO3 Security Team requests TYPO3 administrators to consider our advice from TYPO3-SA-2009-015 to either use extension phpMyAdmin only on development servers or to use the phpMyAdmin standalone application on production servers.
Credits: Thanks to Andreas Beutel for providing a TYPO3 extension package with an updated phpMyAdmin version.