CVE-2018-12613
phpMyAdmin - (Authenticated) Remote Code Execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
12Exploited in Wild
-Decision
Descriptions
An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).
Se ha descubierto un problema en phpMyAdmin en versiones 4.38.3x anteriores a la 4.8.2 por el cual un atacante puede incluir (ver y, potencialmente, ejecutar) archivos en el servidor. La vulnerabilidad procede de una porción de código en el que las páginas se redirigen y cargan en phpMyAdmin y se realiza una prueba inadecuada para páginas en la lista blanca. Un atacante debe estar autenticado, excepto en el caso en el que "$cfg['AllowArbitraryServer'] = true" (en el que un atacante puede especificar cualquier host que ya controle y ejecutar código arbitrario en phpMyAdmin) y en el caso "$cfg['ServerDefault'] = 0" (que omite el requisito de inicio de sesión y ejecuta el código vulnerable sin autenticación).
Multiple vulnerabilities have been found in phpMyAdmin, the worst of which could result in the arbitrary execution of code. Versions less than 4.8.4 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-06-21 CVE Reserved
- 2018-06-21 CVE Published
- 2018-06-22 First Exploit
- 2024-08-05 CVE Updated
- 2025-05-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-287: Improper Authentication
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/104532 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/164623 | 2021-10-25 | |
https://packetstorm.news/files/id/150466 | 2018-11-27 | |
https://packetstorm.news/files/id/148534 | 2018-07-12 | |
https://packetstorm.news/files/id/148283 | 2018-06-22 | |
https://www.exploit-db.com/exploits/45020 | 2024-08-05 | |
https://www.exploit-db.com/exploits/50457 | 2021-10-25 | |
https://www.exploit-db.com/exploits/44928 | 2024-08-05 | |
https://www.exploit-db.com/exploits/44924 | 2024-08-05 | |
https://github.com/0x00-0x00/CVE-2018-12613 | 2018-11-09 | |
https://github.com/ivanitlearning/CVE-2018-12613 | 2019-09-16 | |
https://github.com/eastmountyxz/CVE-2018-12613-phpMyAdmin | 2020-02-19 | |
http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/201904-16 | 2021-11-02 | |
https://www.phpmyadmin.net/security/PMASA-2018-4 | 2021-11-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Phpmyadmin Search vendor "Phpmyadmin" | Phpmyadmin Search vendor "Phpmyadmin" for product "Phpmyadmin" | >= 4.8.0 < 4.8.2 Search vendor "Phpmyadmin" for product "Phpmyadmin" and version " >= 4.8.0 < 4.8.2" | - |
Affected
|