[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-3239Date: (C)2013-05-01   (M)2023-12-22


phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.6
Exploit Score: 3.9
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: HIGH
Authentication: SINGLE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html
FEDORA-2013-6928
FEDORA-2013-6977
FEDORA-2013-7000
MDVSA-2013:160
http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php
https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48
https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133
openSUSE-SU-2013:1065

CPE    13
cpe:/a:phpmyadmin:phpmyadmin:4.0.0:rc2
cpe:/a:phpmyadmin:phpmyadmin:3.5.2.1
cpe:/a:phpmyadmin:phpmyadmin:3.5.3.0
cpe:/a:phpmyadmin:phpmyadmin:3.5.2.0
...
CWE    1
CWE-94
OVAL    2
oval:org.secpod.oval:def:104885
oval:org.secpod.oval:def:104883

© SecPod Technologies