Remote Code Execution Vulnerability in phpMyAdmin by phpMyAdmin
CVE-2018-12613
Key Information:
- Vendor
- PHPmyadmin
- Status
- Vendor
- CVE Published:
- 21 June 2018
Badges
Summary
A vulnerability in phpMyAdmin prior to version 4.8.2 allows an authenticated attacker to include and potentially execute arbitrary files on the server. This issue arises from insufficient validation of whitelisted pages during redirect operations within phpMyAdmin. Notably, if '$cfg[AllowArbitraryServer]' is set to true, attackers can specify hosts under their control to execute arbitrary code. Furthermore, when '$cfg[ServerDefault]' is set to 0, it bypasses authentication, permitting the execution of vulnerable code without the need for login credentials.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
94% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved