4.6 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:S/C:P/I:P/A:P
0.043 Low
EPSS
Percentile
92.3%
Announcement-ID: PMASA-2013-3
Date: 2013-04-24
Locally Saved SQL Dump File Multiple File Extension Remote Code Execution.
phpMyAdmin can be configured to save an export file on the web server, via its SaveDir directive. With this in place, itβs possible, either via a crafted filename template or a crafted table name, to save a double extension file like foobar.php.sql. In turn, an Apache webserver on which there is no definition for the MIME type βsqlβ (the default) will treat this saved file as a β.phpβ script, leading to remote code execution.
We consider this vulnerability to be serious.
This vulnerability can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users to access the required form. Moreover, the SaveDir directive is empty by default, so a default configuration is not vulnerable. The $$cfg[βSaveDirβ] directive must be configured, and the server must be running Apache with mod_mime to be exploitable.
Versions 3.5.x and 4.0.0 (before -rc3) are affected.
For 3.5.x, upgrade to phpMyAdmin 3.5.8 or newer; for 4.0.x, upgrade to 4.0.0-rc3 or newer. You can also apply the patches listed below.
Thanks to Janek Vind for reporting this issue.
Assigned CVE ids: CVE-2013-3239
The following commits have been made on the 3.5 branch to fix this issue:
For further information and in case of questions, please contact the phpMyAdmin team. Our website is phpmyadmin.net.
CPE | Name | Operator | Version |
---|---|---|---|
phpmyadmin | le | 3.5 | |
phpmyadmin | le | 4.0.0 |