CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.1 | $0-$5k | 0.00 |
A vulnerability has been found in phpMyAdmin (Database Administration Software) and classified as problematic. This vulnerability affects an unknown functionality. The manipulation with an unknown input leads to a sql injection vulnerability. The CWE definition for the vulnerability is CWE-89. The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
phpMyAdmin 2.6.0-pl2, and other versions before 2.6.1, with external transformations enabled, allows remote attackers to execute arbitrary commands via shell metacharacters.
The bug was discovered 12/13/2004. The weakness was published 12/13/2004 by Nicolas Gregoire with Exaprobe (Website). The advisory is available at exaprobe.com. This vulnerability was named CVE-2004-1147 since 12/06/2004. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Technical details are unknown but a public exploit is available. This vulnerability is assigned to T1505 by the MITRE ATT&CK project.
After immediately, there has been an exploit disclosed. It is possible to download the exploit at exaprobe.com. It is declared as proof-of-concept. As 0-day the estimated underground price was around $5k-$25k. The vulnerability scanner Nessus provides a plugin with the ID 16006 (GLSA-200412-19 : phpMyAdmin: Multiple vulnerabilities), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Gentoo Local Security Checks and running in the context l.
Upgrading to version 2.6.1-rc1 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at phpmyadmin.net. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published 6 days after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (18441), Tenable (16006), OSVDB (12330†), Secunia (SA13424†) and Vulnerability Center (SBV-6566†).
Product
Type
Name
Version
- 2.4.0
- 2.5.0
- 2.5.1
- 2.5.2
- 2.5.4
- 2.5.5
- 2.5.5 Pl1
- 2.5.5 Rc1
- 2.5.5 Rc2
- 2.5.6 Rc1
- 2.5.7
- 2.5.7 Pl1
- 2.6.0 Pl1
- 2.6.0 Pl2
- 2.6.0 Pl3
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.6VulDB Meta Temp Score: 5.1
VulDB Base Score: 5.6
VulDB Temp Score: 5.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Sql injectionCWE: CWE-89 / CWE-74 / CWE-707
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 16006
Nessus Name: GLSA-200412-19 : phpMyAdmin: Multiple vulnerabilities
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Nessus Port: 🔍
OpenVAS ID: 54778
OpenVAS Name: Gentoo Security Advisory GLSA 200412-19 (phpmyadmin)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Exploit Delay Time: 🔍
Upgrade: phpMyAdmin 2.6.1-rc1
Patch: phpmyadmin.net
Timeline
12/06/2004 🔍12/13/2004 🔍
12/13/2004 🔍
12/13/2004 🔍
12/13/2004 🔍
12/14/2004 🔍
12/15/2004 🔍
12/19/2004 🔍
12/20/2004 🔍
01/10/2005 🔍
07/05/2024 🔍
Sources
Product: phpmyadmin.netAdvisory: exaprobe.com
Researcher: Nicolas Gregoire
Organization: Exaprobe
Status: Not defined
CVE: CVE-2004-1147 (🔍)
X-Force: 18441
Secunia: 13424 - phpMyAdmin Two Vulnerabilities, Highly Critical
OSVDB: 12330 - phpMyAdmin External Transformations Remote Command Execution
Vulnerability Center: 6566
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 12/15/2004 02:45 PMUpdated: 07/05/2024 10:25 PM
Changes: 12/15/2004 02:45 PM (85), 06/30/2019 12:54 PM (3), 07/05/2024 10:25 PM (17)
Complete: 🔍
Cache ID: 35:702:40
No comments yet. Languages: en.
Please log in to comment.