phpMyAdmin remote code execution via /e\\x00 sequenc
Reporter | Title | Published | Views | Family All 47 |
---|---|---|---|---|
![]() | PhpMyAdmin preg_replace Function Code Injection - Ver2 (CVE-2013-3238) | 18 May 201500:00 | β | checkpoint_advisories |
![]() | PhpMyAdmin preg_replace Function Code Injection (CVE-2013-3238) | 22 May 201300:00 | β | checkpoint_advisories |
![]() | CVE-2013-3238 | 26 Apr 201300:00 | β | ubuntucve |
![]() | CVE-2013-3238 | 26 Apr 201303:34 | β | debiancve |
![]() | Remote code execution via preg_replace(). | 24 Apr 201300:00 | β | phpmyadmin |
![]() | phpMyAdmin Authenticated Remote Code Execution Vulnerability | 30 Apr 201300:00 | β | zdt |
![]() | phpMyAdmin 3.5.8 and 4.0.0-RC2 - Multiple Vulnerabilities | 26 Apr 201300:00 | β | zdt |
![]() | phpMyAdmin Authenticated Remote Code Execution via preg_replace() | 26 Apr 201314:42 | β | metasploit |
![]() | phpMyAdmin - 'preg_replace' (Authenticated) Remote Code Execution (Metasploit) | 1 May 201300:00 | β | exploitdb |
![]() | phpMyAdmin 3.5.8/4.0.0-RC2 - Multiple Vulnerabilities | 25 Apr 201300:00 | β | exploitdb |
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
db | query param | /PMA/index.php | phpMyAdmin allows remote authenticated users to execute arbitrary code via a specially crafted sequence in the 'Replace table prefix' feature. | CWE-94,Β CWE-20 |
token | query param | /PMA/index.php | phpMyAdmin allows remote authenticated users to execute arbitrary code via a specially crafted sequence in the 'Replace table prefix' feature. | CWE-94,Β CWE-20 |
from_prefix | request body | /PMA/index.php | The 'from_prefix' parameter is manipulated to exploit a vulnerability in phpMyAdmin's handling of preg_replace, leading to arbitrary code execution. | CWE-94,Β CWE-20 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo