Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2005-2256Improper Handling of URL Encoding (Hex Encoding) in Phppgadmin

Severity
5.0MEDIUMNVD
EPSS
12.5%
top 6.04%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJul 13
Latest updateMay 1

Description

Encoded directory traversal vulnerability in phpPgAdmin 3.1 to 3.5.3 allows remote attackers to access arbitrary files via "%2e%2e%2f" (encoded dot dot) sequences in the formLanguage parameter.

CVSS vector

AV:N/AC:L/C:P/I:N/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/phppgadmin< phppgadmin 3.5.4-1 (forky)
Debianphppgadmin_project/phppgadmin< 3.5.4-1+1
NVDphppgadmin/phppgadmin6 versions+5

🔴Vulnerability Details

2
GHSA
GHSA-pfcx-fx8j-6wch: Encoded directory traversal vulnerability in phpPgAdmin 32022-05-01
OSV
CVE-2005-2256: Encoded directory traversal vulnerability in phpPgAdmin 32005-07-13

💥Exploits & PoCs

1
Exploit-DB
phpPgAdmin 3.x - Login Form Directory Traversal2005-07-05

📋Vendor Advisories

1
Debian
CVE-2005-2256: phppgadmin - Encoded directory traversal vulnerability in phpPgAdmin 3.1 to 3.5.3 allows remo...2005

📐Framework References

2
CWE
Improper Handling of URL Encoding (Hex Encoding)
CWE
Encoding Error