Query tables that might store API keys or plaintext credentials for integrated services.
One of the most famous "HackTricks verified" vulnerabilities. In versions 4.8.0 through 4.8.1, a flaw in the page redirection logic allowed for LFI. index.php?target=db_sql.php%253f/../../../../../../../../etc/passwd Attackers combine this with Session File Poisoning :
If you are stuck within the database, look for these "Quick Wins": phpmyadmin hacktricks verified
Most RCE exploits target versions that are 5+ years old. Summary Table: phpMyAdmin Attack Vectors Requirement Default Creds Poor Configuration Full DB Access LFI (CVE-2018-12613) Version 4.8.x RCE via Session Poisoning SELECT INTO OUTFILE FILE Privilege + Known Path Setup Script Bypass Accessible /setup/ folder Config Manipulation
Note: This requires the secure_file_priv variable to be empty or pointing to the webroot. B. CVE-2018-12613 (Local File Inclusion) Query tables that might store API keys or
If the MySQL user has the FILE privilege and you know the absolute path of the webroot, you can write a PHP shell directly to the server.
In phpMyAdmin 4.3.0 to 4.6.2, a vulnerability in the search feature allowed attackers to execute code through the PHP preg_replace function using the /e (eval) modifier. 4. Advanced Enumeration: HackTricks Style CVE-2018-12613 (Local File Inclusion) If the MySQL user
phpMyAdmin is the ubiquitous web interface for managing MySQL and MariaDB databases. Because it sits directly on top of sensitive data, it is a primary target for security researchers and attackers alike. Drawing from the methodologies popularized by resources like , this guide outlines the verified techniques for enumerating, exploiting, and securing phpMyAdmin installations. 1. Initial Reconnaissance & Version Fingerprinting
phpMyAdmin does not always have built-in rate limiting. Using tools like or THC-Hydra , you can perform a dictionary attack against the pma_username and pma_password fields. Information Schema Leakage
Run SELECT ''; to store the shell in your session file. Find your session ID (from the phpMyAdmin cookie).