CVE-2005-0544

Source
https://nvd.nist.gov/vuln/detail/CVE-2005-0544
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2005-0544.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2005-0544
Published
2005-05-02T04:00:00Z
Modified
2024-11-20T23:55:22Z
Summary
[none]
Details

phpMyAdmin 2.6.1 allows remote attackers to obtain the full path of the server via direct requests to (1) sqlvalidator.lib.php, (2) sqlparser.lib.php, (3) selecttheme.lib.php, (4) selectlang.lib.php, (5) relationcleanup.lib.php, (6) headermetastyle.inc.php, (7) getforeign.lib.php, (8) displaytbllinks.lib.php, (9) displayexport.lib.php, (10) dbtableexists.lib.php, (11) charsetconversion.lib.php, (12) ufpdf.php, (13) mysqli.dbi.lib.php, (14) setup.php, or (15) cookie.auth.lib.php, which reveals the path in a PHP error message.

References

Affected packages

Debian:11 / phpmyadmin

Package

Name
phpmyadmin
Purl
pkg:deb/debian/phpmyadmin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3:2.6.1-pl2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / phpmyadmin

Package

Name
phpmyadmin
Purl
pkg:deb/debian/phpmyadmin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3:2.6.1-pl2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / phpmyadmin

Package

Name
phpmyadmin
Purl
pkg:deb/debian/phpmyadmin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3:2.6.1-pl2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}