CVE-2013-3239
Published Apr 26, 2013
Last updated 11 years ago
Overview
- Description
- phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:N/AC:H/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2577DB75-9893-4496-B9B8-22F4D7C70D8B" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BBC76AB-567B-4081-8520-D4BB2211CA91" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDFD7186-12C3-4FA6-951E-288063262EAE" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4E23EA5-8FD8-441A-8CB6-F1E77AA0D73B" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5FE1328-F2E1-45C8-80ED-0560DAB666EE" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC675B47-0373-442E-9BCD-35D79355073C" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96E2C613-B1E9-4DB5-AA7D-165E5093452F" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B0E7188-E3DE-4A9C-9B9B-31E7276F74AF" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E6D5B72-CA57-4054-B002-56C03856D740" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71325EEA-441A-4D04-85E1-B7627C15ECE8" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE098CE1-0FA0-48C0-8F9F-CC9150E96C40" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56245F7F-C483-42C1-9D30-AA39C3441591" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B406A721-0075-46C8-A920-3C9602AD667B" } ], "operator": "OR" } ] } ]