Description
|
|
Two vulnerabilities have been discovered in phpLDAPadmin, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.
1) Input appended to the URL in cmd.php (when "cmd" is set to "_debug") is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
2) Input passed to the "orderby" parameter in cmd.php (when "cmd" is set to "query_engine", "query" is set to "none", and "search" is set to e.g. "1") is not properly sanitised in lib/functions.php before being used in a "create_function()" function call. This can be exploited to inject and execute arbitrary PHP code.
The vulnerabilities are confirmed in version 1.2.1.1. Other versions may also be affected.
|