Vulnerabilities > CVE-2005-2256 - Directory Traversal vulnerability in PHPPGAdmin Login Form

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
phppgadmin
nessus

Summary

Encoded directory traversal vulnerability in phpPgAdmin 3.1 to 3.5.3 allows remote attackers to access arbitrary files via "%2e%2e%2f" (encoded dot dot) sequences in the formLanguage parameter.

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-759.NASL
    descriptionA vulnerability has been discovered in phppgadmin, a set of PHP scripts to administrate PostgreSQL over the WWW, that can lead to disclose sensitive information. Successful exploitation requires that
    last seen2020-06-01
    modified2020-06-02
    plugin id19221
    published2005-07-18
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19221
    titleDebian DSA-759-1 : phppgadmin - missing input sanitising
  • NASL familyCGI abuses
    NASL idPHPPGADMIN_FORMLANGUAGE_DIR_TRAVERSAL.NASL
    descriptionThe remote host is running phpPgAdmin, a web-based administration tool for PostgreSQL. The installed version of phpPgAdmin fails to filter directory traversal sequences from user input supplied to the
    last seen2020-06-01
    modified2020-06-02
    plugin id18637
    published2005-07-07
    reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/18637
    titlephpPgAdmin index.php formLanguage Parameter Local File Inclusion
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_88188A8CEFF611D983100001020EED82.NASL
    descriptionA Secunia Advisory reports : A vulnerability has been reported in phpPgAdmin, which can be exploited by malicious people to disclose sensitive information. Input passed to the
    last seen2020-06-01
    modified2020-06-02
    plugin id19350
    published2005-08-01
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/19350
    titleFreeBSD : phppgadmin -- 'formLanguage' local file inclusion vulnerability (88188a8c-eff6-11d9-8310-0001020eed82)