You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
hi,
We found a remote code execution vulnerability in phpmoadmin that could allow an attacker to remotely execute arbitrary code to attack an attack server.
code line in 562: The find parameter is directly brought into the eval function.
hi,
We found a remote code execution vulnerability in phpmoadmin that could allow an attacker to remotely execute arbitrary code to attack an attack server.
code line in 562: The find parameter is directly brought into the eval function.
payload:
http://www.xxx.com/moadmin.php?db=datagovernance&action=listRows&collection=quality_control_base&find=array();phpinfo();exit
This payload execution phpinfo();
fix:
In php, the eval function is dangerous. It is not recommended to use it. If you must use it, you need to limit the incoming data.
The text was updated successfully, but these errors were encountered: