Input passed via the "filter" and "attr" parameters to cmd.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Input passed to the "filter" POST parameter in lam/templates/3rdParty/pla/htdocs/cmd.php (when "cmd" is set to "export" and "exporter_id" is set to "LDIF") is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Input passed to the "attr" parameter in lam/templates/3rdParty/pla/htdocs/cmd.php (when "cmd" is set to "add_value_form" and "dn" is set to a valid value) is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Reference: http://www.openwall.com/lists/oss-security/2012/03/06/1 $URL referenced the above descriptions detail from numbers [2] and [3]: http://secunia.com/advisories/48221/ It looks like Secunia's advisory is implying that the above is the same issue but with phpldapadmin specifically since it has been issued it's own CVE. Looks as though, per upstream there is currently no solution: http://sourceforge.net/tracker/?func=detail&aid=3497660&group_id=61828&atid=498546
Vulnerability is fixed in =net-nds/phpldapadmin-1.2.3 (commit #74434e5 in git://git.code.sf.net/p/phpldapadmin/code). Would it be possible for <net-nds/phpldapadmin-1.2.3 to be removed from the tree and this bug closed? No revdeps for this package.
Indeed. @maintainers: cleanup time.
Affected versions removed from the tree.
Closing as noglsa