{"id":"CVE-2008-5587","details":"Directory traversal vulnerability in libraries/lib.inc.php in phpPgAdmin 4.2.1 and earlier, when register_globals is enabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the _language parameter to index.php.","modified":"2026-04-10T03:40:24.731058Z","published":"2008-12-16T19:07:31Z","related":["openSUSE-SU-2024:10035-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/33014"},{"type":"ADVISORY","url":"http://secunia.com/advisories/33263"},{"type":"ADVISORY","url":"http://www.debian.org/security/2008/dsa-1693"},{"type":"EVIDENCE","url":"http://www.securityfocus.com/bid/32670"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2012-04/msg00033.html"},{"type":"WEB","url":"http://securityreason.com/securityalert/4737"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47140"},{"type":"WEB","url":"https://www.exploit-db.com/exploits/7363"}],"schema_version":"1.7.5"}