Vulnerability Details : CVE-2018-12613
Public exploit exists!
An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).
Vulnerability category: Execute codeBypassGain privilege
Products affected by CVE-2018-12613
- cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
Threat overview for CVE-2018-12613
Top countries where our scanners detected CVE-2018-12613
Top open port discovered on systems with this issue
22
IPs affected by CVE-2018-12613 7
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2018-12613!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2018-12613
97.32%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2018-12613
-
phpMyAdmin Authenticated Remote Code Execution
Disclosure Date: 2018-06-19First seen: 2020-04-26exploit/multi/http/phpmyadmin_lfi_rcephpMyAdmin v4.8.0 and v4.8.1 are vulnerable to local file inclusion, which can be exploited post-authentication to execute PHP code by application. The module has been tested with phpMyAdmin v4.8.1. Authors: - ChaMd5 - Henry Huang - Jacob Robles
CVSS scores for CVE-2018-12613
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2018-12613
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-12613
-
https://www.exploit-db.com/exploits/44928/
phpMyAdmin 4.8.1 - (Authenticated) Local File Inclusion (2)Third Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html
phpMyAdmin 4.8.1 Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://www.phpmyadmin.net/security/PMASA-2018-4/
phpMyAdmin - Security - PMASA-2018-4Vendor Advisory
-
https://www.exploit-db.com/exploits/44924/
phpMyAdmin 4.8.1 - (Authenticated) Local File Inclusion (1)Exploit;Third Party Advisory;VDB Entry
-
https://security.gentoo.org/glsa/201904-16
phpMyAdmin: Multiple vulnerabilities (GLSA 201904-16) — Gentoo securityThird Party Advisory
-
https://www.exploit-db.com/exploits/45020/
phpMyAdmin - (Authenticated) Remote Code Execution (Metasploit)Exploit;Third Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/104532
phpMyAdmin CVE-2018-12613 Remote File Inclusion VulnerabilityThird Party Advisory;VDB Entry
Jump to