Korean
<< Back
VID 22096
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description An input validation error exists in phpPgAdmin on the web server that could allow remote users to cause arbitrary files to be included and loaded by the PHP interpreter at runtime.
phpPgAdmin is an easy to use web based administration interface for PostgreSQL written in PHP. A further indication of phpMyAdmin's popularity is the fact that is has since been ported (largely by independent development) from MySQL to also work on PostgreSQL as a separate product called phpPgAdmin.
phpMyAdmin and phpPgAdmin by its common code base makes insecure calls to the PHP function include(). The phpPgAdmin versions below 2.3 allows an attacker to execute arbitrary commands on the remote web server, or to read the configuration files of the installation thereby gaining database credentials with the permissions of the web server user. Please note that enabling 'Advanced Authentication' does not prevent this attack.

* References:
http://www.securityfocus.com/bid/2642
ftp://ftp.greatbridge.org/pub/phppgadmin/stable/phpPgAdmin_2-3.tar.gz
Recommendation Upgrade to the latest version immediately. You can download the fixed version from:
ftp://ftp.greatbridge.org/pub/phppgadmin/stable/phpPgAdmin_2-3.tar.gz

SecureReality is providing patches for the problems from:
phpPgAdmin 2.2.1: http://www.securereality.com.au/patches/phpPgAdmin-SecureReality.diff

Users of earlier versions are advised to upgrade to the versions specified then apply the patches.

To apply the patches:
- cd to the directory in which the application files are stored (e.g
/home/httpd/html/phpPgAdmin/)
- run 'patch -p0 < *Path to patch filename*'
Related URL CVE-2001-0478 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)