Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | PHPMyAdmin v4.8.0 and v.4.8.1 LFI exploit | https://github.com/0x00-0x00/CVE-2018-12613 | POC Details |
| 2 | Modified standalone exploit ported for Python 3 | https://github.com/ivanitlearning/CVE-2018-12613 | POC Details |
| 3 | 这篇文章将分享一个phpMyAdmin 4.8.1版本的文件包含漏洞,从配置到原理,再到漏洞复现进行讲解,更重要的是让大家了解这些真实漏洞背后的知识。基础性文章,希望对您有所帮助! | https://github.com/eastmountyxz/CVE-2018-12613-phpMyAdmin | POC Details |
| 4 | PhpMyAdmin before version 4.8.2 is susceptible to local file inclusion that allows an attacker to include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication). | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-12613.yaml | POC Details |
| 5 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/phpmyadmin-cve-2018-12613-file-inclusion.yml | POC Details |
| 6 | https://github.com/vulhub/vulhub/blob/master/phpmyadmin/CVE-2018-12613/README.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet