Korean
<< Back
VID 21646
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The phpPgAdmin is vulnerable to a directory traversal vulnerability in the formLanguage parameter. phpPgAdmin is a fully functional web-based administration utility for a PostgreSQL database server. phpPgAdmin version 3.5.3 and possibly other versions are vulnerable to a directory traversal vulnerability, caused by improper validation of user-supplied input in the formLanguage parameter in the login.php script. If register_globals is enabled, a remote attacker could send a specially-crafted URL request including "%2e%2e%2f" (encoded dot dot) sequences in the formLanguage parameter of the login.php script to read arbitrary files outside of the document root directory.

* References:
http://secunia.com/advisories/15941/
http://archives.neohapsis.com/archives/dailydave/2005-q3/0010.html
http://securitytracker.com/id?1014414
http://www.vuxml.org/freebsd/88188a8c-eff6-11d9-8310-0001020eed82.html
http://sourceforge.net/project/shownotes.php?release_id=342261

* Platforms Affected:
SourceForge.net, phpPgAdmin version 3.5.3 and possibly other versions
Any Operating system Any version
Recommendation Upgrade to the latest version of phpPgAdmin (3.5.4 or later), available from the phpPgAdmin Web site at http://sourceforge.net/projects/phppgadmin
Related URL CVE-2005-2256 (CVE)
Related URL 14142 (SecurityFocus)
Related URL 21265 (ISS)