### [CVE-2011-2507](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2507) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description libraries/server_synchronize.lib.php in the Synchronize implementation in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 does not properly quote regular expressions, which allows remote authenticated users to inject a PCRE e (aka PREG_REPLACE_EVAL) modifier, and consequently execute arbitrary PHP code, by leveraging the ability to modify the SESSION superglobal array. ### POC #### Reference - http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html - http://ha.xxor.se/2011/07/phpmyadmin-3x-pregreplace-rce-poc.html - http://securityreason.com/securityalert/8306 #### Github No PoCs found on GitHub currently.