Related Weaknesses
CWE-ID |
Weakness Name |
Source |
CWE-264 |
Category : Permissions, Privileges, and Access Controls Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control. |
|
Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
7.5 |
|
AV:N/AC:L/Au:N/C:P/I:P/A:P |
[email protected] |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 23356
Publication date : 2012-12-12 23h00 +00:00
Author : Mark Stanislav
EDB Verified : Yes
'portable-phpMyAdmin (WordPress Plugin)' Authentication Bypass (CVE-2012-5469)
Mark Stanislav -
[email protected]
I. DESCRIPTION
---------------------------------------
portable-phpMyAdmin doesn't verify an existing WordPress session (privileged or not) when accessing the plugin file path directly. Because of how this plugin works, a default installation will provide a full phpMyAdmin console with the privilege level of the MySQL configuration of WordPress.
II. TESTED VERSION
---------------------------------------
1.3.0
III. PoC EXPLOIT
---------------------------------------
Navigate to http://host/wp-content/plugins/portable-phpmyadmin/wp-pma-mod and you will be presented with the full portable-phpMyAdmin web interface without the requirement of a session or any credential.
IV. SOLUTION
---------------------------------------
Upgrade to version 1.3.1
V. REFERENCES
---------------------------------------
http://wordpress.org/extend/plugins/portable-phpmyadmin/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5469
VI. TIMELINE
---------------------------------------
10/13/2012 - Initial developer disclosure
10/14/2012 - Response from developer with commitment to fix the vulnerability
10/31/2012 - Follow-up with developer after no communication or patched release
11/16/2012 - Second attempt to follow-up with developer regarding progress/timetable
11/26/2012 - Contacted WordPress 'plugins team' about lack of progress on patched release
11/27/2012 - WordPress 'plugins team' patches software and releases version 1.3.1
12/12/2012 - Public disclosure
Products Mentioned
Configuraton 0
Phpmyadmin>>Phpmyadmin >> Version 1.0.0
Phpmyadmin>>Phpmyadmin >> Version 1.0.1
Phpmyadmin>>Phpmyadmin >> Version 1.0.2
Phpmyadmin>>Phpmyadmin >> Version 1.0.3
Phpmyadmin>>Phpmyadmin >> Version 1.0.4
Phpmyadmin>>Phpmyadmin >> Version 1.0.5
Phpmyadmin>>Phpmyadmin >> Version 1.0.6
Phpmyadmin>>Phpmyadmin >> Version 1.0.6
Phpmyadmin>>Phpmyadmin >> Version 1.0.7
Phpmyadmin>>Phpmyadmin >> Version 1.0.8
Phpmyadmin>>Phpmyadmin >> Version 1.1
Phpmyadmin>>Phpmyadmin >> Version 1.2
Phpmyadmin>>Phpmyadmin >> Version 1.2.1
Phpmyadmin>>Phpmyadmin >> Version 1.2.2
Phpmyadmin>>Phpmyadmin >> Version 1.2.3
Phpmyadmin>>Phpmyadmin >> Version 1.2.4
Phpmyadmin>>Phpmyadmin >> Version 1.2.5
Phpmyadmin>>Phpmyadmin >> Version 1.2.6
Phpmyadmin>>Phpmyadmin >> Version 1.2.7
Phpmyadmin>>Phpmyadmin >> Version 1.2.8
Phpmyadmin>>Phpmyadmin >> Version 1.2.9
Phpmyadmin>>Phpmyadmin >> Version 1.2.9.1
Phpmyadmin>>Phpmyadmin >> Version 1.2.9.2
Phpmyadmin>>Phpmyadmin >> Version 1.2.9.3
Phpmyadmin>>Phpmyadmin >> Version 1.2.9.4
Phpmyadmin>>Phpmyadmin >> Version 1.2.9.4
Phpmyadmin>>Phpmyadmin >> Version 1.2.9.5
Phpmyadmin>>Phpmyadmin >> Version 1.3
Phpmyadmin>>Phpmyadmin >> Version 1.3
Wordpress>>Wordpress >> Version -
References