First published: Thu Jun 21 2018(Updated: )
An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/phpmyadmin/phpmyadmin | >=4.8<4.8.2 | 4.8.2 |
PhpMyAdmin | >=4.8.0<4.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12613 is a vulnerability in phpMyAdmin version 4.8.x before 4.8.2 that allows an attacker to include and potentially execute files on the server.
CVE-2018-12613 exploits an improper test for whitelisted pages in phpMyAdmin, allowing an attacker to redirect and load arbitrary files on the server.
CVE-2018-12613 has a severity rating of 8.8 (high).
To fix CVE-2018-12613, upgrade to phpMyAdmin version 4.8.2 or later.
You can find more information about CVE-2018-12613 at the following references: [1] [2] [3]