phpMoAdmin-MongoDB-Admin-Tool-for-PHP
phpMoAdmin-MongoDB-Admin-Tool-for-PHP copied to clipboard
phpMoAdmin Remote Code Execution
hi,
We found a remote code execution vulnerability in phpmoadmin that could allow an attacker to remotely execute arbitrary code to attack an attack server.
code line in 562: The find parameter is directly brought into the eval function.
payload: http://www.xxx.com/moadmin.php?db=datagovernance&action=listRows&collection=quality_control_base&find=array();phpinfo();exit
This payload execution phpinfo();
fix: In php, the eval function is dangerous. It is not recommended to use it. If you must use it, you need to limit the incoming data.