7.5
CVSSv2

CVE-2016-5734

Published: 03/07/2016 Updated: 01/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 756
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

phpMyAdmin 4.0.x prior to 4.0.10.16, 4.4.x prior to 4.4.15.7, and 4.6.x prior to 4.6.3 does not properly choose delimiters to prevent use of the preg_replace e (aka eval) modifier, which might allow remote malicious users to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

phpmyadmin phpmyadmin 4.0.5

phpmyadmin phpmyadmin 4.0.4.2

phpmyadmin phpmyadmin 4.0.4.1

phpmyadmin phpmyadmin 4.0.10.6

phpmyadmin phpmyadmin 4.0.10.5

phpmyadmin phpmyadmin 4.0.9

phpmyadmin phpmyadmin 4.0.8

phpmyadmin phpmyadmin 4.0.2

phpmyadmin phpmyadmin 4.0.10.9

phpmyadmin phpmyadmin 4.0.10.2

phpmyadmin phpmyadmin 4.0.10.14

phpmyadmin phpmyadmin 4.0.1

phpmyadmin phpmyadmin 4.0.0

phpmyadmin phpmyadmin 4.0.10.11

phpmyadmin phpmyadmin 4.0.10.10

phpmyadmin phpmyadmin 4.0.10.15

phpmyadmin phpmyadmin 4.0.4

phpmyadmin phpmyadmin 4.0.3

phpmyadmin phpmyadmin 4.0.10.4

phpmyadmin phpmyadmin 4.0.10.3

phpmyadmin phpmyadmin 4.0.10.1

phpmyadmin phpmyadmin 4.0.10

phpmyadmin phpmyadmin 4.0.7

phpmyadmin phpmyadmin 4.0.6

phpmyadmin phpmyadmin 4.0.10.8

phpmyadmin phpmyadmin 4.0.10.7

phpmyadmin phpmyadmin 4.0.10.13

phpmyadmin phpmyadmin 4.0.10.12

phpmyadmin phpmyadmin 4.6.0

phpmyadmin phpmyadmin 4.6.2

phpmyadmin phpmyadmin 4.6.1

phpmyadmin phpmyadmin 4.4.15.6

phpmyadmin phpmyadmin 4.4.5

phpmyadmin phpmyadmin 4.4.4

phpmyadmin phpmyadmin 4.4.15

phpmyadmin phpmyadmin 4.4.14.1

phpmyadmin phpmyadmin 4.4.13.1

phpmyadmin phpmyadmin 4.4.0

phpmyadmin phpmyadmin 4.4.8

phpmyadmin phpmyadmin 4.4.7

phpmyadmin phpmyadmin 4.4.15.4

phpmyadmin phpmyadmin 4.4.15.3

phpmyadmin phpmyadmin 4.4.11

phpmyadmin phpmyadmin 4.4.10

phpmyadmin phpmyadmin 4.4.6.1

phpmyadmin phpmyadmin 4.4.6

phpmyadmin phpmyadmin 4.4.15.2

phpmyadmin phpmyadmin 4.4.15.1

phpmyadmin phpmyadmin 4.4.1.1

phpmyadmin phpmyadmin 4.4.1

phpmyadmin phpmyadmin 4.4.15.5

phpmyadmin phpmyadmin 4.4.9

phpmyadmin phpmyadmin 4.4.3

phpmyadmin phpmyadmin 4.4.2

phpmyadmin phpmyadmin 4.4.13

phpmyadmin phpmyadmin 4.4.12

Exploits

#!/usr/bin/env python """cve-2016-5734py: PhpMyAdmin 430 - 462 authorized user RCE exploit Details: Working only at PHP 430-546 versions, because of regex break with null byte fixed in PHP 547 CVE: CVE-2016-5734 Author: twittercom/iamsecurity run: /cve-2016-5734py -u root --pwd="" localhost/pma -c "system('ls -lua');" ...

Github Repositories

PhpMyAdmin 4.0.x—4.6.2 Remote Code Execution Vulnerability (CVE-2016-5734)

CVE-2016-5734-docker PhpMyAdmin 40x—462 Remote Code Execution Vulnerability (CVE-2016-5734) Setup git clone githubcom/miko550/CVE-2016-5734-dockergit cd CVE-2016-5734-docker docker compose up hhtp://localhost:8083 exploit python3 cve-2016-5734py -u root --pwd="root" localhost:8083 -c "system(

trache is track patch file tool

cve_watch Tracking of patch information base on the CVE number for debian, ubuntu and redhat Usage Register want to track CVE number $ cve_watch add CVE-2016-5734 Get a list of the CVE number tracked $ cve_watch list CVE_NUMBER CREATED_AT CVE-2016-4971 2016-08-01 18:58:38 CVE-2016-5734 2016-08-01 18:58:45

cve-report-template $ pyenv install 351 $ pyenv global 351 $ pip install --upgrade pip $ pip install requests $ pip install lxml $ pip install cssselect $ python tmplpl CVE-2016-5734 # CVE-2016-5734 ## 概要 ## CVSS v3 |CVSS v3 Base Score|98 Critical| |Vector|CVSS:30/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H| |Impact Score| 59| |Exploitability Score| 39| |Attack Vector

Computer Security Foundations The following write-ups have to do with CTFs and laboratorial tasks from the Seed Labs repository Every write-up concerns a weekly CTF challenge and a lab: Write-up Corresponding Seed Lab LOGBOOK_3 CVE-2016-5734 LOGBOOK_4 Environment Variable and Set-UID Lab LOGBOOK_5 Buffer-Overflow Attack Lab (Set-UID Version) LOGBOOK_6 Format Strin