Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gg36-9346-9qx9

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.5

Описание

phpMyAdmin Remote Code Execution

phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename.

Пакеты

Наименование

phpmyadmin/phpmyadmin

composer
Затронутые версииВерсия исправления

>= 3.5.0, < 3.5.8.1

3.5.8.1

EPSS

Процентиль: 94%
0.16133
Средний

8.5 High

CVSS3

Дефекты

CWE-94

Связанные уязвимости

ubuntu
около 12 лет назад

phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename.

nvd
около 12 лет назад

phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename.

debian
около 12 лет назад

phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir ...

EPSS

Процентиль: 94%
0.16133
Средний

8.5 High

CVSS3

Дефекты

CWE-94