- XSS attacks:
The phpMyAdmin page is vulnerable to XSS attacks on 'navigation trees' or 'db_central_columpns.php' where the attacker can use crafted files to manipulate the victim to load files into a different location using the 'import' feature. Also, the attacker can insert payloads into the database which can cause deletion or modification of data.
- SQL Injection attack:
Attacker can inject SQL queries in the 'tracking functionality' allowing the attacker to gain read and write access to configuration storage database, sometimes also giving the privilege to access some tables of MySQL database.
- DoS (Denial of Service) Attacks:
By initiating a very large request to the 'table partitioning function', an attacker can launch a DoS attack on the system. DoS attack can also be initiated by sending a large number of requests to access the 'value' parameter of a 'saved searches' feature. By attempting brute-force attacks on the username and password fields to gain access to the admin privileges, the attacker can sometimes cause an unintended DoS attack.
Impact of the attack:
If any of the above attacks take place, attacker will be able to-
- Steal data
- Delete or manipulate data
- Gain unauthorized access to certain tables of the database
- Create or store malicious files in the database
- Make changes to configuration settings of the database
- Crash the website or impact user experience through DoS attacks
How to prevent this attack?
We can prevent this attack as given below:
- White-listing the users who should have external access to the phpMyAdmin page.
- Change the default login URL to ensure only trusted users can access it.
- Using the latest / updated versions of phpMyAdmin.
- Using Strong passwords to prevent successful brute-force attacks.
- Disable root login to phpMyAdmin
- Enable HTTPS on phpMyAdmin page so that the username and password are not transmitted in plain text.