4.6
CVSSv2

CVE-2013-3239

Published: 26/04/2013 Updated: 19/11/2013
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 465
Vector: AV:N/AC:H/Au:S/C:P/I:P/A:P

Vulnerability Summary

phpMyAdmin 3.5.x prior to 3.5.8 and 4.x prior to 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename.

Vulnerable Product Search on Vulmon Subscribe to Product

phpmyadmin phpmyadmin 3.5.7

phpmyadmin phpmyadmin 3.5.8

phpmyadmin phpmyadmin 3.5.2.1

phpmyadmin phpmyadmin 3.5.2.2

phpmyadmin phpmyadmin 3.5.1.0

phpmyadmin phpmyadmin 3.5.6

phpmyadmin phpmyadmin 3.5.0.0

phpmyadmin phpmyadmin 3.5.5

phpmyadmin phpmyadmin 4.0.0

phpmyadmin phpmyadmin 3.5.2.0

phpmyadmin phpmyadmin 3.5.3.0

phpmyadmin phpmyadmin 3.5.4

Exploits

[waraxe-2013-SA#103] - Multiple Vulnerabilities in phpMyAdmin =============================================================================== Author: Janek Vind "waraxe" Date: 25 April 2013 Location: Estonia, Tartu Web: wwwwaraxeus/advisory-103html Description of vulnerable software: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ...
phpMyAdmin versions 358 and 400-RC2 suffer from multiple remote code execution, local file inclusion, and array overwrite vulnerabilities ...