Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | N/A |
CWE-ID | CWE-200 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software |
Adminer Web applications / Remote management & hosting panels |
Vendor | Jakub Vrána |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU17073
Risk: Medium
CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information.
The weakness exists due to passwords leak. A remote attacker needs a modified MySQL server, which is altered to send out data import requests to any client that connects to find an open adminer.php
on the victim system, instruct Adminer to connect to his rigged MySQL server (external connections are actually a feature of Adminer) and connect to the foreign server, login with the credentials, and immediately receive a data import request from the server for a specific file.
Successful exploitation of the vulnerability may allow to steal private data or inject a skimmer.
Note: the vulnerability is been actively exploited by a hacking group Megacart.
Update to version 4.7.0.
Vulnerable software versionsAdminer: 3.0.0 rc1 - 4.6.2
CPE2.3http://gwillem.gitlab.io/2019/01/17/adminer-4.6.2-file-disclosure-vulnerability/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.