We found results for “”
WS-2018-0640
Good to know:
Date: June 28, 2018
Adminer script before 4.6.3 contains file disclosure vulnerability. Exploitation happens in three stages. First, the attacker needs a modified MySQL server, which is altered to send out data import requests to any client that connects. Second, an attacker needs to find an open "adminer.php" on the victim system. Third, as the attacker now has the master password for the victim site, he can use the same Adminer to access the database of the victim. And continue to steal private data or inject a skimmer.
Language: PHP
Severity Score
Severity Score
Weakness Type (CWE)
Files or Directories Accessible to External Parties
CWE-552Top Fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | HIGH |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |