Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2016-5734

Description

phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace e (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementation.

POC

Reference

- https://www.exploit-db.com/exploits/40185/

Github

- https://github.com/15866095848/15866095848

- https://github.com/2dukes/PROJ_FSI_2122

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/HKirito/phpmyadmin4.4_cve-2016-5734

- https://github.com/KosukeShimofuji/CVE-2016-5734

- https://github.com/KosukeShimofuji/cve-report-template

- https://github.com/KosukeShimofuji/cve_watch

- https://github.com/Micr067/Pentest_Note

- https://github.com/SexyBeast233/SecBooks

- https://github.com/Ygodsec/-

- https://github.com/atdpa4sw0rd/Experience-library

- https://github.com/czq945659538/-study

- https://github.com/duckstroms/Web-CTF-Cheatsheet

- https://github.com/g1san/Agents-for-Vulnerable-Dockers-and-related-Benchmarks

- https://github.com/heane404/CVE_scan

- https://github.com/lnick2023/nicenice

- https://github.com/miko550/CVE-2016-5734-docker

- https://github.com/mrhenrike/Hacking-Cheatsheet

- https://github.com/pwnosec/CTF-Cheatsheet

- https://github.com/qazbnm456/awesome-cve-poc

- https://github.com/sv3nbeast/Attack-Notes

- https://github.com/w181496/Web-CTF-Cheatsheet

- https://github.com/xbl3/awesome-cve-poc_qazbnm456

- https://github.com/xiaoy-sec/Pentest_Note

- https://github.com/zhang040723/web