cve/2016/CVE-2016-5734.md

39 lines
1.7 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2016-5734](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5734)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace e (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementation.
### POC
#### Reference
- https://www.exploit-db.com/exploits/40185/
#### Github
- https://github.com/15866095848/15866095848
- https://github.com/2dukes/PROJ_FSI_2122
- https://github.com/ARPSyndicate/cvemon
- https://github.com/HKirito/phpmyadmin4.4_cve-2016-5734
- https://github.com/KosukeShimofuji/CVE-2016-5734
- https://github.com/KosukeShimofuji/cve-report-template
- https://github.com/KosukeShimofuji/cve_watch
- https://github.com/Micr067/Pentest_Note
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Ygodsec/-
- https://github.com/atdpa4sw0rd/Experience-library
- https://github.com/czq945659538/-study
- https://github.com/duckstroms/Web-CTF-Cheatsheet
- https://github.com/heane404/CVE_scan
- https://github.com/lnick2023/nicenice
- https://github.com/miko550/CVE-2016-5734-docker
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/sv3nbeast/Attack-Notes
- https://github.com/w181496/Web-CTF-Cheatsheet
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xiaoy-sec/Pentest_Note
- https://github.com/zhang040723/web