Exploit CVE-2022–23808

Hello cyber security enthusiast! This article is about on my recently assigned CVE of very popular database management tool. So, without any delay let’s start.
What is phpMyAdmin?
phpMyAdmin is a free and open-source administration tool for MySQL and MariaDB. As a portable web application written primarily in PHP, it has become one of the most popular MySQL administration tools, especially for web hosting services.
How to Identify?
You can identify by doing
- Directory Brute forcing (i.e. /phpMyAdmin/)
- Nmap (Ports i.e. 8081, 9090, 2086)
- Shodan (query: http.component:phpMyAdmin)
- Google Dork (Inurl:”/phpmyadmin/setup/index.php” Intitle:”phpMyAdmin”), etc.
Exploitation
Reference:
Acknowledgement: phpMyAdmin
Exploit: GitHub
CVE: CVE-2020–23808
Thank you for reading! 😊
Jay Hind, Vande Mataram 🇮🇳
Twitter: Dipak Panchal
Instagram: th3.d1p4k