CVE-2013-3239

phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.6 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:S/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
VendorProductVersion
phpmyadminphpmyadmin
3.5.0.0
phpmyadminphpmyadmin
3.5.1.0
phpmyadminphpmyadmin
3.5.2.0
phpmyadminphpmyadmin
3.5.2.1
phpmyadminphpmyadmin
3.5.2.2
phpmyadminphpmyadmin
3.5.3.0
phpmyadminphpmyadmin
3.5.4
phpmyadminphpmyadmin
3.5.5
phpmyadminphpmyadmin
3.5.6
phpmyadminphpmyadmin
3.5.7
phpmyadminphpmyadmin
3.5.7:rc1
phpmyadminphpmyadmin
3.5.8:rc1
phpmyadminphpmyadmin
4.0.0:rc2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
phpmyadmin
bullseye
4:5.0.4+dfsg2-2+deb11u1
fixed
bookworm
4:5.2.1+dfsg-1
fixed
sid
4:5.2.1+dfsg-4
fixed
trixie
4:5.2.1+dfsg-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
phpmyadmin
zesty
not-affected
yakkety
not-affected
xenial
not-affected
wily
not-affected
vivid
not-affected
utopic
not-affected
trusty
not-affected
saucy
not-affected
raring
not-affected
quantal
ignored
precise
ignored
oneiric
ignored
lucid
ignored
hardy
ignored