Information disclosure in Adminer - #VU17073

 

Information disclosure in Adminer - #VU17073

Published: January 18, 2019 / Updated: February 16, 2021


Vulnerability identifier: #VU17073
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: N/A
CWE-ID: CWE-200
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Jakub Vrána
Affected software:
Adminer

Detailed vulnerability description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to passwords leak. A remote attacker needs a modified MySQL server, which is altered to send out data import requests to any client that connects to find an open adminer.php on the victim system, instruct Adminer to connect to his rigged MySQL server (external connections are actually a feature of Adminer) and connect to the foreign server, login with the credentials, and immediately receive a data import request from the server for a specific file.

Successful exploitation of the vulnerability may allow to steal private data or inject a skimmer.

Note: the vulnerability is been actively exploited by a hacking group Megacart.

Remediation

Update to version 4.7.0.

Sources