6 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
0.973 High
EPSS
Percentile
99.9%
The phpMyAdmin development team reports:
In some PHP versions, the preg_replace() function can be
tricked into executing arbitrary PHP code on the
server. This is done by passing a crafted argument as the
regular expression, containing a null byte. phpMyAdmin does
not correctly sanitize an argument passed to preg_replace()
when using the βReplace table prefixβ feature, opening the
way to this vulnerabilityβ¦
This vulnerability can be triggered only by someone who
logged in to phpMyAdmin, as the usual token protection
prevents non-logged-in users to access the required
form.
phpMyAdmin can be configured to save an export file on
the web server, via its SaveDir directive. With this in
place, itβs possible, either via a crafted filename template
or a crafted table name, to save a double extension file
like foobar.php.sql. In turn, an Apache webserver on which
there is no definition for the MIME type βsqlβ (the default)
will treat this saved file as a β.phpβ script, leading to
remote code execution.
This vulnerability can be triggered only by someone who
logged in to phpMyAdmin, as the usual token protection
prevents non-logged-in users to access the required
form. Moreover, the SaveDir directive is empty by default,
so a default configuration is not vulnerable. The
$cfg[βSaveDirβ] directive must be configured, and the server
must be running Apache with mod_mime to be exploitable.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | phpmyadmin | =Β 3.5 | UNKNOWN |
FreeBSD | any | noarch | phpmyadmin | <Β 3.5.8.1 | UNKNOWN |