phpMoAdmin saveObject Remote Command Execution

high Nessus Plugin ID 84217

Synopsis

The remote web server is affected by a command execution vulnerability.

Description

The remote web server is hosting a version of phpMoAdmin that is affected by a remote code execution vulnerability due to improper sanitization of input passed via the 'object' POST parameter in the saveObject() function in the moadmin.php script. A remote attacker can exploit this, via a specially crafted request, to execute arbitrary commands.

Solution

There is currently no patch publicly available.

See Also

http://www.phpmoadmin.com/

Plugin Details

Severity: High

ID: 84217

File Name: phpmoadmin_saveobject_rce.nasl

Version: 1.9

Type: remote

Family: CGI abuses

Published: 6/16/2015

Updated: 5/28/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:avinu:phpmoadmin

Required KB Items: installed_sw/phpMoAdmin

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 3/12/2015

Exploitable With

Metasploit (PHPMoAdmin 1.1.2 Remote Code Execution)

Reference Information

CVE: CVE-2015-2208

BID: 72877