Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 130833 - net-nds/phpldapadmin: 0.9.8 and prior: Multiple Input Validation Vulnerabilities
Summary: net-nds/phpldapadmin: 0.9.8 and prior: Multiple Input Validation Vulnerabilities
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://pridels.blogspot.com/2006/04/p...
Whiteboard: B4 [noglsa] DerCorny
Keywords:
Depends on:
Blocks:
 
Reported: 2006-04-22 07:38 UTC by Dax
Modified: 2006-05-02 09:54 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Dax 2006-04-22 07:38:31 UTC
Vuln. Description:

phpLDAPadmin contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed to "dn" paremeter in "compare_form.php",
"copy_form.php","rename_form.php","template_engine.php",
"delete_form.php" isn't properly sanitised before being returned to the user.
And input passed to "scope" parameter in "search.php" isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.


examples:

/compare_form.php?server_id=0&dn=%22%3Cscript
%3Ealert('r0t')%3C/script%3E

/copy_form.php?server_id=0&dn=%22%3Cscript%3E
alert('r0t')%3C/script%3E

/rename_form.php?server_id=0&dn=%22%3Cscript
%3Ealert('r0t')%3C/script%3E

/template_engine.php?server_id=0&dn=%22%3Cs
cript%3Ealert('r0t')%3C/script%3E

/delete_form.php?server_id=0&dn=%22%3Cscript
%3Ealert('r0t')%3C/script%3E

/search.php?server_id=0&search=true&filter=
objectClass%3D%2A&base_dn=cn%3Dtoto%2Cdc%3D
example%2Cdc%3Dcom&form=advanced&scope=%22%
3Cscript%3Ealert('r0t')%3C/script%3E


And there also script insertion vuln. or html injection:

Like i say , take in example "/template_engine.php" and let input in
Container DN : [XSS]
Machine Name: [XSS]
UID Number: [XSS]
Those fields isn't sanitised before being stored in the vuln. system. This can be exploited to execute arbitrary script code in a user's browser session in context of an affected website when a malicious system entry is viewed.

Rgds
Daxomatic
Comment 1 Stefan Cornelius (RETIRED) gentoo-dev 2006-04-22 08:38:39 UTC
x86 please test and mark at least version 0.9.8.2 stable, thank you
Comment 2 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-04-25 13:59:51 UTC
it's CVE-2006-2016
Comment 3 Thierry Carrez (RETIRED) gentoo-dev 2006-04-28 11:10:24 UTC
x86 please test and mark stable
Comment 4 Saleem Abdulrasool (RETIRED) gentoo-dev 2006-04-30 12:55:24 UTC
0.9.8.2 stable on x86
Comment 5 Thierry Carrez (RETIRED) gentoo-dev 2006-05-02 09:35:31 UTC
Thx, ready for GLSa vote.
I vote no, for XSS on non-typically-internet-facing webapp
Comment 6 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-05-02 09:54:00 UTC
Voting NO and closing. Feel free to reopen if you disagree.