Skip to content

Commit 9efc727

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 4c0f2c2 commit 9efc727

1 file changed

Lines changed: 16 additions & 11 deletions

File tree

db/modules_metadata_base.json

Lines changed: 16 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -143507,7 +143507,7 @@
143507143507
"needs_cleanup": true
143508143508
},
143509143509
"exploit_unix/webapp/phpmyadmin_config": {
143510-
"name": "PhpMyAdmin Config File Code Injection",
143510+
"name": "phpMyAdmin Config File Code Injection",
143511143511
"fullname": "exploit/unix/webapp/phpmyadmin_config",
143512143512
"aliases": [],
143513143513
"rank": 600,
@@ -143516,15 +143516,20 @@
143516143516
"author": [
143517143517
"Greg Ose",
143518143518
"pagvac",
143519-
"egypt <egypt@metasploit.com>"
143519+
"egypt <egypt@metasploit.com>",
143520+
"Tenable",
143521+
"g0tmi1k"
143520143522
],
143521-
"description": "This module exploits a vulnerability in phpMyAdmin's setup\n feature which allows an attacker to inject arbitrary PHP\n code into a configuration file. The original advisory says\n the vulnerability is present in phpMyAdmin versions 2.11.x\n < 2.11.9.5 and 3.x < 3.1.3.1; this module was tested on\n 3.0.1.1.\n\n The file where our payload is written\n (phpMyAdmin/config/config.inc.php) is not directly used by\n the system, so it may be a good idea to either delete it or\n copy the running config (phpMyAdmin/config.inc.php) over it\n after successful exploitation.",
143523+
"description": "This module exploits a vulnerability in phpMyAdmin's setup\n feature which allows an attacker to inject arbitrary PHP\n code into a configuration file. The original advisory says\n the vulnerability is present in phpMyAdmin versions\n 2.11.x <= 2.11.9.4 and 3.x <= 3.1.3.\n\n There was a follow up vulnerability as the patch was\n incomplete, affecting versions 3.x <= 3.1.3.1.\n\n The file where our payload is written\n (phpMyAdmin/config/config.inc.php) is not directly used by\n the system, so it may be a good idea to either delete it or\n copy the running config (phpMyAdmin/config.inc.php) over it\n after successful exploitation.",
143522143524
"references": [
143523143525
"CVE-2009-1151",
143524143526
"OSVDB-53076",
143525143527
"EDB-8921",
143526-
"URL-http://www.phpmyadmin.net/home_page/security/PMASA-2009-3.php",
143527-
"URL-http://labs.neohapsis.com/2009/04/06/about-cve-2009-1151/"
143528+
"URL-https://www.phpmyadmin.net/security/PMASA-2009-3/",
143529+
"URL-https://web.archive.org/web/20130724101149/http://labs.neohapsis.com/2009/04/06/about-cve-2009-1151/",
143530+
"CVE-2009-1285",
143531+
"URL-https://www.phpmyadmin.net/security/PMASA-2009-4/",
143532+
"URL-https://www.tenable.com/security/research/tra-2009-02"
143528143533
],
143529143534
"platform": "PHP",
143530143535
"arch": "php",
@@ -143545,24 +143550,24 @@
143545143550
"https"
143546143551
],
143547143552
"targets": [
143548-
"Automatic (phpMyAdmin 2.11.x < 2.11.9.5 and 3.x < 3.1.3.1)"
143553+
"Automatic (phpMyAdmin 2.11.x <= 2.11.9.4 and 3.x <= 3.1.3.1)"
143549143554
],
143550-
"mod_time": "2025-06-23 12:43:46 +0000",
143555+
"mod_time": "2026-04-21 18:43:54 +0000",
143551143556
"path": "/modules/exploits/unix/webapp/phpmyadmin_config.rb",
143552143557
"is_install_path": true,
143553143558
"ref_name": "unix/webapp/phpmyadmin_config",
143554-
"check": false,
143559+
"check": true,
143555143560
"post_auth": false,
143556143561
"default_credential": false,
143557143562
"notes": {
143558143563
"Reliability": [
143559-
"unknown-reliability"
143564+
"repeatable-session"
143560143565
],
143561143566
"Stability": [
143562-
"unknown-stability"
143567+
"crash-safe"
143563143568
],
143564143569
"SideEffects": [
143565-
"unknown-side-effects"
143570+
"config-changes"
143566143571
]
143567143572
},
143568143573
"session_types": false,

0 commit comments

Comments
 (0)