From ac13ed15b32b2842bf3e098612abab7b1079c75f Mon Sep 17 00:00:00 2001 From: simon Date: Fri, 8 Jul 2005 21:36:19 +0000 Subject: Document phppgadmin -- "formLanguage" local file inclusion vulnerability. --- security/vuxml/vuln.xml | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 14cc7c29762b..44ddc12390ef 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,40 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + phppgadmin -- "formLanguage" local file inclusion vulnerability + + + phppgadmin + 0 + + + + +

A Secunia Advisory reports:

+
+

A vulnerability has been reported in phpPgAdmin, which + can be exploited by malicious people to disclose sensitive + information.

+

Input passed to the "formLanguage" parameter in + "index.php" isn't properly verified, before it is used to + include files. This can be exploited to include arbitrary + files from local resources.

+

Successful exploitation requires that "magic_quotes_gpc" + is disabled.

+
+ +
+ + 14142 + http://secunia.com/advisories/15941/ + + + 2005-07-05 + 2005-07-08 + +
+ pear-XML_RPC -- information disclosure vulnerabilities -- cgit