Jump to content
  • Revista PROGRAMAR: Já está disponível a edição #60 da revista programar. Faz já o download aqui!

Sign in to follow this  

Serious vulnerability in phpMyAdmin

Recommended Posts


All versions of phpMyAdmin, the popular MySQL administration tool, up to and including version and the 3.0.0 release candidate 1, suffer from a code execution vulnerability. Versions and 3.0.0-rc2 have been released with the vulnerability fixed. The phpMyAdmin developers describe the flaw as serious and recommend upgrading to the appropriate new version.

The advisory released by the phpMyAdmin developers stated the problem was that parameters of sort_by were not escaped and an attacker, if they were already logged in, could manipulate this to call the PHP exec function and run arbitrary code. The vulnerability was discovered by Norman Hippert in 3.0.0 RC1 initially, and checking showed that previous versions were also affected.

A partial workaround, for those unable to upgrade immediately, is to set disable_functions = exec in php.ini, but this change may have unwanted side effects, as it will block any PHP program from starting processes.

Update The vulnerability actually allows any PHP code to be run, so the above workaround is only effective against attacks where exec would be called. It is therefore recommended that users upgrade as soon as possible.

phpMyAdmin Code Execution Vulnerability

Our lives begin to end the day we become silent about things that matter - Martin Luther King

Share this post

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  


Important Information

By using this site you accept our Terms of Use and Privacy Policy. We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.