5
CVSSv2

CVE-2005-2256

Published: 13/07/2005 Updated: 05/09/2008
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Encoded directory traversal vulnerability in phpPgAdmin 3.1 to 3.5.3 allows remote malicious users to access arbitrary files via "%2e%2e%2f" (encoded dot dot) sequences in the formLanguage parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

phppgadmin phppgadmin 3.1

phppgadmin phppgadmin 3.5.3

phppgadmin phppgadmin 3.2

phppgadmin phppgadmin 3.3

phppgadmin phppgadmin 3.4

phppgadmin phppgadmin 3.4.1

Vendor Advisories

A vulnerability has been discovered in phppgadmin, a set of PHP scripts to administrate PostgreSQL over the WWW, that can lead to disclose sensitive information Successful exploitation requires that "magic_quotes_gpc" is disabled The old stable distribution (woody) is not affected by this problem For the stable distribution (sarge) this problem ...

Exploits

source: wwwsecurityfocuscom/bid/14142/info phpPgAdmin is prone to a directory traversal vulnerability The application fails to filter directory traversal sequences from requests to the login form All versions of phpPgAdmin are considered to be vulnerable at the moment formUsername=username&formPassword=password&formServer=0& ...