FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

phpLDAPadmin -- Remote PHP code injection vulnerability

Affected packages
1.2.0 <= phpldapadmin < 1.2.1.1_1,1

Details

VuXML ID edf47177-fe3f-11e0-a207-0014a5e3cda6
Discovery 2011-10-23
Entry 2011-10-24

EgiX (n0b0d13s at gmail dot com) reports:

The $sortby parameter passed to 'masort' function in file lib/functions.php isn't properly sanitized before being used in a call to create_function() at line 1080. This can be exploited to inject and execute arbitrary PHP code. The only possible attack vector is when handling the 'query_engine' command, in which input passed through $_REQUEST['orderby'] is passed as $sortby parameter to 'masort' function.

References

URL http://packetstormsecurity.org/files/106120/phpldapadmin-inject.txt
URL http://sourceforge.net/tracker/?func=detail&aid=3417184&group_id=61828&atid=498546

OSZAR »