All Print Products

Phpmyadmin Hacktricks Verified Guide

Note: This requires the secure_file_priv variable to be empty or pointing to the webroot. B. CVE-2018-12613 (Local File Inclusion)

In some misconfigured environments, a "config" auth type might be used where the credentials are hardcoded. If you find a way to read config.inc.php (via Local File Inclusion), you gain instant access. 3. Post-Auth Exploitation: From SQL to RCE

Force users to login via a non-root account and use sudo -like permissions within MySQL. phpmyadmin hacktricks verified

Hunt for wp_users (WordPress) or users tables to dump hashes for other services.

phpMyAdmin does not always have built-in rate limiting. Using tools like or THC-Hydra , you can perform a dictionary attack against the pma_username and pma_password fields. Information Schema Leakage Note: This requires the secure_file_priv variable to be

In phpMyAdmin 4.3.0 to 4.6.2, a vulnerability in the search feature allowed attackers to execute code through the PHP preg_replace function using the /e (eval) modifier. 4. Advanced Enumeration: HackTricks Style

Check if the /setup/ directory is accessible. If left unconfigured, it can sometimes be used to trick the application into connecting to a remote, malicious database server. 2. Exploiting Authentication If you find a way to read config

Most RCE exploits target versions that are 5+ years old. Summary Table: phpMyAdmin Attack Vectors Requirement Default Creds Poor Configuration Full DB Access LFI (CVE-2018-12613) Version 4.8.x RCE via Session Poisoning SELECT INTO OUTFILE FILE Privilege + Known Path Setup Script Bypass Accessible /setup/ folder Config Manipulation

Look at the footer of the login page or check /README or /Documentation.html .

Shopping cart

JOIN THE MAGIC LIST

phpmyadmin hacktricks verified

Receive Exclusive Email Offers

Enter your email below to enroll.

Want to Earn Points on Every Purchase and Save Even More?

Will be used in accordance with our Privacy Policy
We use cookies to improve your experience on our website. By browsing this website, you agree to our use of cookies.