Files
vulhub/adminer/CVE-2021-43008/README.md
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00

1.1 KiB

Adminer Remote Arbitrary File Read (CVE-2021-43008)

中文版本(Chinese version)

Adminer is a tool for managing content in databases developed by PHP. It natively supports MySQL, MariaDB, PostgreSQL, SQLite, MS SQL, Oracle, Elasticsearch and MongoDB.

Improper Access Control in Adminer versions 1.12.0 to 4.6.2 (fixed in version 4.6.3) allows an attacker to achieve Arbitrary File Read on the remote server by requesting the Adminer to connect to a remote MySQL database.

References:

Vulnerable environment

Execute following command to start a PHP server with Adminer 4.6.2:

docker compose up -d

After the server is started, you can see the login page of Adminer at http://your-ip:8080.

Exploit

Start a roguo MySQL server through mysql-fake-server, then paste the fileread_/etc/passwd into username field:

Receive the request and the /etc/passwd has been written into current directory: