mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 03:02:30 +00:00
39 lines
1.7 KiB
Markdown
39 lines
1.7 KiB
Markdown
![]() |
### [CVE-2016-5734](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5734)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace e (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementation.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.exploit-db.com/exploits/40185/
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/15866095848/15866095848
|
||
|
- https://github.com/2dukes/PROJ_FSI_2122
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/HKirito/phpmyadmin4.4_cve-2016-5734
|
||
|
- https://github.com/KosukeShimofuji/CVE-2016-5734
|
||
|
- https://github.com/KosukeShimofuji/cve-report-template
|
||
|
- https://github.com/KosukeShimofuji/cve_watch
|
||
|
- https://github.com/Micr067/Pentest_Note
|
||
|
- https://github.com/SexyBeast233/SecBooks
|
||
|
- https://github.com/Ygodsec/-
|
||
|
- https://github.com/atdpa4sw0rd/Experience-library
|
||
|
- https://github.com/czq945659538/-study
|
||
|
- https://github.com/duckstroms/Web-CTF-Cheatsheet
|
||
|
- https://github.com/heane404/CVE_scan
|
||
|
- https://github.com/lnick2023/nicenice
|
||
|
- https://github.com/miko550/CVE-2016-5734-docker
|
||
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||
|
- https://github.com/sv3nbeast/Attack-Notes
|
||
|
- https://github.com/w181496/Web-CTF-Cheatsheet
|
||
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
||
|
- https://github.com/xiaoy-sec/Pentest_Note
|
||
|
- https://github.com/zhang040723/web
|
||
|
|