Miggo Logo

CVE-2021-43008: Files or Directories Accessible to External Parties in Adminer

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.9925%
Published
4/6/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
vrana/adminercomposer>= 1.12.0, < 4.6.34.6.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from Adminer's MySQL driver allowing LOAD DATA LOCAL INFILE commands when connecting to a remote database. The patch in 4.6.3 explicitly disables this feature. The MySQL::connect function (or equivalent connection handler in the MySQL driver) would be responsible for setting connection parameters, including options that control LOCAL INFILE handling. The lack of restrictions on this command in vulnerable versions allowed attackers to exfiltrate files via a rigged MySQL server.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Improp*r ****ss *ontrol in **min*r v*rsions *.**.* to *.*.* (*ix** in v*rsion *.*.*) *llows *n *tt**k*r to ***i*v* *r*itr*ry *il* R*** on t** r*mot* s*rv*r *y r*qu*stin* t** **min*r to *onn**t to * r*mot* MySQL **t***s*.

Reasoning

T** vuln*r**ility st*ms *rom **min*r's MySQL *riv*r *llowin* LO** **T* LO**L IN*IL* *omm*n*s w**n *onn**tin* to * r*mot* **t***s*. T** p*t** in *.*.* *xpli*itly *is**l*s t*is ***tur*. T** MySQL::*onn**t *un*tion (or *quiv*l*nt *onn**tion **n*l*r in t