phpLDAPadmin <= 1.2.3 'entry_chooser.php' Multiple Cross-Site Scripting
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
phpLDAPadmin |
Fix Released
|
Unknown
|
|||
phpldapadmin (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
$request['form'] and $request['rdn'] parameters in file htdocs/
18 $request['form'] = get_request(
..
20 $request['rdn'] = get_request(
..
27 printf(" eval ('o = opener.
..
74 $href['return'] = sprintf(
This vulnerability, if successfully exploited, can lead to data manipulation or information leakage as it is demonstrated in the PoC video.
# PoC Video:
https:/
# Affected versions
Versions from 1.1.0 to 1.2.3
Ubuntu release: 16.04.2 LTS
Package version: 1.2.2-5.2ubuntu2
CVE References
Changed in phpldapadmin (Ubuntu): | |
status: | Incomplete → Triaged |
Changed in phpldapadmin: | |
status: | Unknown → Confirmed |
Changed in phpldapadmin: | |
status: | Confirmed → Fix Released |
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res