Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 388349 (CVE-2011-4074) - <net-nds/phpldapadmin-1.2.1.1-r1: Cross-Site Scripting and Code Injection Vulnerabilities (CVE-2011-{4074,4075})
Summary: <net-nds/phpldapadmin-1.2.1.1-r1: Cross-Site Scripting and Code Injection Vul...
Status: RESOLVED FIXED
Alias: CVE-2011-4074
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://secunia.com/advisories/46551/
Whiteboard: ~1 [noglsa]
Keywords: InVCS
Depends on:
Blocks:
 
Reported: 2011-10-24 15:56 UTC by Agostino Sarubbo
Modified: 2011-11-17 00:01 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2011-10-24 15:56:30 UTC
From secunia security advisory at $URL:

Description:
1) Input appended to the URL in cmd.php (when "cmd" is set to "_debug") is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

2) Input passed to the "orderby" parameter in cmd.php (when "cmd" is set to "query_engine", "query" is set to "none", and "search" is set to e.g. "1") is not properly sanitised in lib/functions.php before being used in a "create_function()" function call. This can be exploited to inject and execute arbitrary PHP code.

The vulnerabilities are confirmed in version 1.2.1.1. Other versions may also be affected.


Solution:
Fixed in the GIT repository.
1) http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin;a=blobdiff;f=lib/functions.php;h=eb160dc9f7d74e563131e21d4c85d7849a0c6638;hp=19fde9974d4e5eb3bfac04bb223ccbefdb98f9a0;hb=76e6dad13ef77c5448b8dfed1a61e4acc7241165;hpb=5d4245f93ae6f065e7535f268e3cd87a23b07744

2) http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin;a=blobdiff;f=htdocs/cmd.php;h=0ddf0044355abc94160be73122eb34f3e48ab2d9;hp=34f3848fe4a6d4c00c7c568afa81f59579f5d724;hb=64668e882b8866fae0fa1b25375d1a2f3b4672e2;hpb=caeba72171ade4f588fef1818aa4f6243a68b85e

@maintainer(s): Please patch it and remove old/vulnerable version
Comment 1 Jorge Manuel B. S. Vicetto (RETIRED) Gentoo Infrastructure gentoo-dev 2011-10-25 18:20:34 UTC
phpldapadmin-1.2.1.1-r1 committed to tree with the security patches.
Comment 2 Tim Sammut (RETIRED) gentoo-dev 2011-10-25 18:22:59 UTC
Great, thanks, closing noglsa for ~arch only package.
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2011-11-17 00:01:27 UTC
CVE-2011-4075 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4075):
  The masort function in lib/functions.php in phpLDAPadmin 1.2.x before 1.2.2
  allows remote attackers to execute arbitrary PHP code via the orderby
  parameter (aka sortby variable) in a query_engine action to cmd.php, as
  exploited in the wild in October 2011.

CVE-2011-4074 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4074):
  Cross-site scripting (XSS) vulnerability in cmd.php in phpLDAPadmin 1.2.x
  before 1.2.2 allows remote attackers to inject arbitrary web script or HTML
  via an _debug command.