Executive Summary

Summary
Title New phppgadmin packages fix directory traversal vulnerability
Informations
Name DSA-759 First vendor Publication 2005-07-18
Vendor Debian Last vendor Modification 2005-07-18
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability has been discovered in phppgadmin, a set of PHP scripts to administrate PostgreSQL over the WWW, that can lead to disclose sensitive information. Successful exploitation requires that "magic_quotes_gpc" is disabled.

the old stable distribution (woody) is not affected by this problem.

For the stable distribution (sarge) this problem has been fixed in version 3.5.2-5.

For the unstable distribution (sid) this problem has been fixed in version 3.5.4.

We recommend that you upgrade your phppgadmin package.

Original Source

Url : http://www.debian.org/security/2005/dsa-759

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-64 Using Slashes and URL Encoding Combined to Bypass Validation Logic
CAPEC-72 URL Encoding

CWE : Common Weakness Enumeration

% Id Name

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 6

OpenVAS Exploits

Date Description
2008-09-04 Name : FreeBSD Ports: phppgadmin
File : nvt/freebsd_phppgadmin.nasl
2008-01-17 Name : Debian Security Advisory DSA 759-1 (phppgadmin)
File : nvt/deb_759_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
17758 phpPgAdmin index.php formLanguage Parameter Local File Inclusion

phpPgAdmin contains a flaw that allows a remote attacker to include files outside of the web path. The issue is due to the index.php script not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the formLanguage variable.

Nessus® Vulnerability Scanner

Date Description
2005-08-01 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_88188a8ceff611d983100001020eed82.nasl - Type : ACT_GATHER_INFO
2005-07-18 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-759.nasl - Type : ACT_GATHER_INFO
2005-07-07 Name : The remote web server contains a PHP script that is affected by a local file ...
File : phppgadmin_formlanguage_dir_traversal.nasl - Type : ACT_ATTACK

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:34:09
  • Multiple Updates