Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2006-6943Improper Input Validation in Phpmyadmin

Severity
5.0MEDIUMNVD
EPSS
11.5%
top 6.35%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 19
Latest updateMay 1

Description

PhpMyAdmin before 2.9.1.1 allows remote attackers to obtain the full server path via direct requests to (a) scripts/check_lang.php and (b) themes/darkblue_orange/layout.inc.php; and via the (1) lang[], (2) target[], (3) db[], (4) goto[], (5) table[], and (6) tbl_group[] array arguments to (c) index.php, and the (7) back[] argument to (d) sql.php; and an invalid (8) sort_by parameter to (e) server_databases.php and (9) db parameter to (f) db_printview.php.

CVSS vector

AV:N/AC:L/C:P/I:N/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/phpmyadmin< phpmyadmin 4:2.9.1.1-2 (bookworm)
Debianphpmyadmin/phpmyadmin< 4:2.9.1.1-2+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-x8fh-8c7v-9r64: PhpMyAdmin before 22022-05-01
OSV
CVE-2006-6943: PhpMyAdmin before 22007-01-19

💥Exploits & PoCs

1
Exploit-DB
phpMyAdmin 2.x - Multiple Script Array Handling Full Path Disclosures2006-09-15

📋Vendor Advisories

1
Debian
CVE-2006-6943: phpmyadmin - PhpMyAdmin before 2.9.1.1 allows remote attackers to obtain the full server path...2006