From owner-freebsd-ports-bugs@FreeBSD.ORG Thu Mar 5 21:50:02 2009 Return-Path: Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id A0C07106566B; Thu, 5 Mar 2009 21:50:02 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 7D8078FC20; Thu, 5 Mar 2009 21:50:02 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n25Lo23e010155; Thu, 5 Mar 2009 21:50:02 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n25Lo2x0010154; Thu, 5 Mar 2009 21:50:02 GMT (envelope-from gnats) Resent-Date: Thu, 5 Mar 2009 21:50:02 GMT Resent-Message-Id: <200903052150.n25Lo2x0010154@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Cc: dinoex@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Eygene Ryabinkin Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 0633F106566B for ; Thu, 5 Mar 2009 21:41:39 +0000 (UTC) (envelope-from rea-fbsd@codelabs.ru) Received: from 0.mx.codelabs.ru (0.mx.codelabs.ru [144.206.177.45]) by mx1.freebsd.org (Postfix) with ESMTP id AEB6E8FC0A for ; Thu, 5 Mar 2009 21:41:38 +0000 (UTC) (envelope-from rea-fbsd@codelabs.ru) Received: from phoenix.codelabs.ru (ppp83-237-105-48.pppoe.mtu-net.ru [83.237.105.48]) by 0.mx.codelabs.ru with esmtps (TLSv1:CAMELLIA256-SHA:256) id 1LfLJx-000DUc-Io for FreeBSD-gnats-submit@freebsd.org; Fri, 06 Mar 2009 00:41:37 +0300 Message-Id: <20090305212108.B829CB8041@phoenix.codelabs.ru> Date: Fri, 6 Mar 2009 00:21:08 +0300 (MSK) From: Eygene Ryabinkin To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 X-GNATS-Notify: dinoex@FreeBSD.org Cc: Subject: ports/132346: [vuxml] document CVE-2008-5587 in PHPPgAdmin X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Eygene Ryabinkin List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Mar 2009 21:50:03 -0000 >Number: 132346 >Category: ports >Synopsis: [vuxml] document CVE-2008-5587 in PHPPgAdmin >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Thu Mar 05 21:50:01 UTC 2009 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release: FreeBSD 7.1-STABLE amd64 >Organization: Code Labs >Environment: System: FreeBSD 7.1-STABLE amd64 >Description: PHPPgAdmin <= 4.2.1 is prone to the directory traversal and arbitrary file disclosure when register_globals is enabled. >How-To-Repeat: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5587 >Fix: The following VuXML entry should be evaluated and added: --- vuln.xml begins here --- phppgadmin -- directory traversal with register_globals enabled phppgadmin 4.2.2

Secunia reports:

Dun has discovered a vulnerability in phpPgAdmin, which can be exploited by malicious people to disclose sensitive information.

Input passed via the "_language" parameter to libraries/lib.inc.php is not properly sanitised before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal attacks and URL-encoded NULL bytes.

Successful exploitation of this vulnerability requires that "register_globals" is enabled.

CVE-2008-5587 32670 http://secunia.com/advisories/33014 2008-12-08 TODAY
--- vuln.xml ends here --- >Release-Note: >Audit-Trail: >Unformatted: