oss-sec mailing list archives

Re: CVE request: phpldapadmin <= 1.2.1.1 XSS and and code injection flaws


From: Kurt Seifried <kseifried () redhat com>
Date: Tue, 25 Oct 2011 09:12:07 -0600

On 10/24/2011 12:19 PM, Vincent Danen wrote:
Two flaws were found in phpldapadmin <= 1.2.1.1 that can lead to an XSS
or code injection:

1) Input appended to the URL in cmd.php (when "cmd" is set to "_debug")
is not properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's browser
session in context of an affected site.

Please use CVE-2011-4074 for this one

2) Input passed to the "orderby" parameter in cmd.php (when "cmd" is set
to "query_engine", "query" is set to "none", and "search" is set to e.g.
"1") is not properly sanitised in lib/functions.php before being used in
a "create_function()" function call. This can be exploited to inject and
execute arbitrary PHP code.
Please use CVE-2011-4075 for this one


Could CVEs be assigned to these please?

References:

http://sourceforge.net/tracker/index.php?func=detail&aid=3417184&group_id=61828&atid=498546

http://www.exploit-db.com/exploits/18021/
https://secunia.com/advisories/46551/
http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin;a=blobdiff;f=htdocs/cmd.php;h=0ddf0044355abc94160be73122eb34f3e48ab2d9;hp=34f3848fe4a6d4c00c7c568afa81f59579f5d724;hb=64668e882b8866fae0fa1b25375d1a2f3b4672e2;hpb=caeba72171ade4f588fef1818aa4f6243a68b85e

http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin;a=blobdiff;f=lib/functions.php;h=eb160dc9f7d74e563131e21d4c85d7849a0c6638;hp=19fde9974d4e5eb3bfac04bb223ccbefdb98f9a0;hb=76e6dad13ef77c5448b8dfed1a61e4acc7241165;hpb=5d4245f93ae6f065e7535f268e3cd87a23b07744



-- 

-Kurt Seifried / Red Hat Security Response Team


Current thread: