CVE-2023-45196

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to cause denial of service by tricking Adminer/AdminerEvo into connecting to malicious services that respond with HTTP redirects. The attack consumes server resources subject to PHP configuration limits. Affects Adminer (unsupported) and AdminerEvo before version 4.8.4.

💻 Affected Systems

Products:
  • Adminer
  • AdminerEvo
Versions: All versions of Adminer (unsupported), AdminerEvo before 4.8.4
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability depends on PHP configuration limits (max_execution_time, memory_limit). Adminer is no longer supported upstream.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability due to resource exhaustion, potentially affecting all users of the database management interface.

🟠

Likely Case

Temporary service degradation or unavailability for Adminer/AdminerEvo interface users.

🟢

If Mitigated

Limited impact if PHP resource limits are properly configured and monitored.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable but have reduced attack surface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP redirect loop can be created to exploit this vulnerability without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: AdminerEvo 4.8.4

Vendor Advisory: https://github.com/adminerevo/adminerevo/pull/102/commits/23e7cdc0a32b3739e13d19ae504be0fe215142b6

Restart Required: No

Instructions:

1. Download AdminerEvo 4.8.4 or later from official repository. 2. Replace existing AdminerEvo files with patched version. 3. Verify installation by checking version.

🔧 Temporary Workarounds

Restrict PHP Resource Limits

all

Configure PHP to limit resource consumption and prevent DoS

php -i | grep -E '(max_execution_time|memory_limit)'
Edit php.ini: max_execution_time = 30, memory_limit = 128M

Network Access Control

linux

Restrict Adminer/AdminerEvo access to trusted networks only

iptables -A INPUT -p tcp --dport [adminer-port] -s [trusted-network] -j ACCEPT
iptables -A INPUT -p tcp --dport [adminer-port] -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit Adminer/AdminerEvo exposure
  • Configure aggressive PHP resource limits and implement monitoring for resource exhaustion

🔍 How to Verify

Check if Vulnerable:

Check AdminerEvo version - if below 4.8.4, vulnerable. For Adminer, all versions are vulnerable as unsupported.

Check Version:

grep -r 'version' adminer_directory/ | grep -i '4.8'

Verify Fix Applied:

Verify AdminerEvo version is 4.8.4 or higher using version check or by examining source code for redirect handling fixes.

📡 Detection & Monitoring

Log Indicators:

  • Multiple HTTP redirect errors in PHP/application logs
  • Resource exhaustion warnings in system logs
  • Unusual outbound connections from Adminer instance

Network Indicators:

  • Multiple HTTP 3xx responses to Adminer requests
  • Unusual traffic patterns to/from Adminer port

SIEM Query:

source="php.log" AND "redirect" AND "adminer" OR source="apache.log" AND status=3* AND uri="*/adminer*"

🔗 References

📤 Share & Export