Description
Encoded directory traversal vulnerability in phpPgAdmin 3.1 to 3.5.3 allows remote attackers to access arbitrary files via "%2e%2e%2f" (encoded dot dot) sequences in the formLanguage parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
https://www.exploit-db.com/exploits/25938
References (8)
Core 8
Core References
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2005/dsa-759
Third Party Advisory mailing-list
x_refsource_mlist
http://archives.neohapsis.com/archives/dailydave/2005-q3/0010.html
Vendor Advisory x_refsource_misc
http://www.vuxml.org/freebsd/88188a8c-eff6-11d9-8310-0001020eed82.html
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/14142
Exploit vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1014414
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/16116
Product x_refsource_confirm
http://sourceforge.net/project/shownotes.php?release_id=342261
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/15941
Scores
EPSS
0.1252
EPSS Percentile
94.0%
Details
Status
published
Products (6)
phppgadmin/phppgadmin
3.1
phppgadmin/phppgadmin
3.2
phppgadmin/phppgadmin
3.3
phppgadmin/phppgadmin
3.4
phppgadmin/phppgadmin
3.4.1
phppgadmin/phppgadmin
3.5.3
Published
Jul 13, 2005
Tracked Since
Feb 18, 2026