PHPMyAdmin v4.8.0 and v.4.8.1 LFI exploit# CVE-2018-12613
Local file inclusion bug due to filter bypass using %253f character.
# Software Affected
1. PHPMyAdmin v.4.8.0
2. PHPMyAdmin v.4.8.1
# How to use
This PowerShell scripts need three parameters to craft a exploit HTTP request:
1. PHPMyAdmin URL endpoint
2. Cookies for an authenticated user
3. A full path file to be retrieved in remote server
# Example
Prepare all the parameters to use the script:

Then, after you run it:

# Remote Code Execution
This could lead to remote code execution if you query a SELECT SQL containing PHP code. Then you can include your session file in /var/lib/php/sessions/SESSION_ID_HERE file to execute arbitrary PHP code.
I haven't coded a Code execution PoC. But you can do it manually and trigger it with this code.
Code author: @_zc00l
[4.0K] /data/pocs/7a03466614fe2cc83d4a3df005870488205ea1a9
├── [ 95K] example-2.JPG
├── [ 54K] example.JPG
├── [ 18K] LICENSE
├── [2.4K] PHPMyAdmin-LFI.ps1
└── [ 863] README.md
0 directories, 5 files