First published: Wed Jul 13 2005(Updated: )
Encoded directory traversal vulnerability in phpPgAdmin 3.1 to 3.5.3 allows remote attackers to access arbitrary files via "%2e%2e%2f" (encoded dot dot) sequences in the formLanguage parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
phpPgAdmin | =3.1 | |
phpPgAdmin | =3.2 | |
phpPgAdmin | =3.3 | |
phpPgAdmin | =3.4 | |
phpPgAdmin | =3.4.1 | |
phpPgAdmin | =3.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2256 is classified with a moderate severity due to its potential for directory traversal attacks.
To fix CVE-2005-2256, upgrade phpPgAdmin to version 3.5.4 or later where this vulnerability has been addressed.
CVE-2005-2256 affects phpPgAdmin versions 3.1 to 3.5.3.
CVE-2005-2256 allows remote attackers to perform directory traversal attacks to access arbitrary files.
Yes, CVE-2005-2256 is a known vulnerability that has been documented and reported publicly.