Miggo Logo

CVE-2017-18264: phpMyAdmin Improper Privilege Management

9.8

CVSS Score
3.0

Basic Information

EPSS Score
0.6656%
Published
5/13/2022
Updated
4/24/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
phpmyadmin/phpmyadmincomposer>= 4.0, < 4.0.10.204.0.10.20
phpmyadmin/phpmyadmincomposer>= 4.7.0-beta1, < 4.7.04.7.0
phpmyadmin/phpmyadmincomposer>= 4.4.0, <= 4.4.15.10
phpmyadmin/phpmyadmincomposer>= 4.6.0, <= 4.6.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper handling of empty passwords via PHP's substr() function in the authentication logic. The phpMyAdmin security advisory explicitly identifies the interaction between $cfg['Servers'][$i]['AllowNoPassword'] and PHP's substr() behavior as the root cause. Though the exact function name isn't specified in the provided materials, the file path (libraries/common.inc.php) and the function's role in password validation are confirmed in multiple sources. The substr() usage in this context directly enables the privilege escalation bypass, meeting high confidence criteria.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *is*ov*r** in li*r*ri*s/*ommon.in*.p*p in p*pMy**min *.* ***or* *.*.**.**, *.*.x, *.*.x, *n* *.*.* pr*r*l**s*s. T** r*stri*tions **us** *y $***['S*rv*rs'][$i]['*llowNoP*sswor*'] = **ls* *r* *yp*ss** un**r **rt*in P*P v*rsions (*.*., v*rs

Reasoning

T** vuln*r**ility st*ms *rom improp*r **n*lin* o* *mpty p*sswor*s vi* `P*P's su*str()` *un*tion in t** *ut**nti**tion lo*i*. T** `p*pMy**min` s**urity **visory *xpli*itly i**nti*i*s t** int*r**tion **tw**n `$***['S*rv*rs'][$i]['*llowNoP*sswor*']` *n*