Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-12613

Опубликовано: 21 июн. 2018
Источник: debian
EPSS Критический

Описание

An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
phpmyadminnot-affectedpackage

Примечания

  • https://www.phpmyadmin.net/security/PMASA-2018-4/

  • https://github.com/phpmyadmin/phpmyadmin/commit/7662d02939fb3cf6f0d9ec32ac664401dcfe7490

EPSS

Процентиль: 100%
0.94137
Критический

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 7 лет назад

An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).

CVSS3: 8.8
nvd
около 7 лет назад

An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).

CVSS3: 8.8
github
около 3 лет назад

phpMyAdmin Improper Authentication

CVSS3: 8.8
fstec
около 7 лет назад

Уязвимость веб-приложения для администрирования cистем управления базами данных phpMyAdmin, связанная с недостатками процедуры аутентификации, позволяющая нарушителю просматривать и выполнять файлы на сервере

suse-cvrf
около 7 лет назад

Security update for phpMyAdmin

EPSS

Процентиль: 100%
0.94137
Критический