{ "id": "CVE-2005-0459", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", "lastModified": "2024-11-20T23:55:10.410", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "phpMyAdmin 2.6.2-dev, and possibly earlier versions, allows remote attackers to determine the full path of the web root via a direct request to select_lang.lib.php, which reveals the path in a PHP error message." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "61A423F0-91C8-48C9-A6B1-46DBB1A31DC1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "59384A5A-F530-4417-8AFB-005EE4A54A44" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "85CFC048-C7C5-47E6-A7E9-E1ED99142493" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "120A58AE-69B7-426D-947D-9C0D9D9CE1E2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "8E1CEFBE-9194-4350-9F81-2EA6EDF52AEB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "980AC0DB-2759-49D3-8347-C119AFFF8DBD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CABC8407-173D-466B-B366-5F7F5D9F2F14" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B1D2743D-5B67-4D6A-9A03-FCF9EA4534A3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2C2535BF-A7BE-40DD-9582-0DE66B8FDC2B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F666B78D-5DC9-4256-8A23-A4021AE7044A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "096B01B4-3CD4-4CB4-8528-D1DB0D0BFB44" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "229DE8B7-489B-4848-B1BE-2339CB771573" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "D9BC58E6-CA26-4760-A6A4-D65184A50539" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "ACE7C97E-60C6-417F-86F7-963ADE52A895" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_pre1:*:*:*:*:*:*:*", "matchCriteriaId": "3FF189AE-9485-4F8C-AAAE-25088DF6F964" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "560BC57D-BDCE-4479-9847-6DB53A89FFD0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_rc2:*:*:*:*:*:*:*", "matchCriteriaId": "4859644F-E5FF-4AE4-B16D-CC2243964D81" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_rc3:*:*:*:*:*:*:*", "matchCriteriaId": "FD44FE0C-C9A5-4B2E-AE71-CFDE406DCA6C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C3DE653E-E7FF-4DE0-A7C8-CC86C95550F6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "48888218-B238-4F0D-A4C2-E9877D3F3A4C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A393256A-A5BE-4467-8058-E9CA5D626D59" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B9C4839-2356-4630-BDB3-4A0171F3A785" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "22C55462-6370-45B3-8F00-50F4502981F1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "18BBE005-1FEC-4178-A6A0-CAAB148948F2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "6D2E7577-5F89-4B2C-9C28-A5268B539968" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "929F5CD6-51F3-42CF-8BA8-579120DD835D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_pl1:*:*:*:*:*:*:*", "matchCriteriaId": "0F86B56F-510F-4C6F-A259-6200DC2B05ED" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "92B58A87-7A30-494D-9A9A-AF9FE6E59600" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_rc2:*:*:*:*:*:*:*", "matchCriteriaId": "F56E2F91-DC93-4FF0-AFF2-DBB5E13B467D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.6_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "F2C2D276-CFA3-40CB-AEAF-C641BAD4EB61" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DF345665-3C1D-4F44-B648-B695D88267BF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.7_pl1:*:*:*:*:*:*:*", "matchCriteriaId": "99FD7D45-135D-4AE7-83E0-FDFE436DFE4E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl1:*:*:*:*:*:*:*", "matchCriteriaId": "D7C3F2E1-FEFC-4C04-B337-7AC3E38AE430" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl2:*:*:*:*:*:*:*", "matchCriteriaId": "F2C525B9-636F-49B9-B528-50AEB0E98F4D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl3:*:*:*:*:*:*:*", "matchCriteriaId": "DFB3EBBF-E696-48D1-B3BA-B3C88C050F12" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.2_dev:*:*:*:*:*:*:*", "matchCriteriaId": "704C4359-A80E-456F-AA69-D188E4DFDBA9" } ] } ] } ], "references": [ { "url": "http://securitytracker.com/id?1013210", "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1013210", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ] } ] }