aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorglarkin <glarkin@FreeBSD.org>2011-10-24 23:20:27 +0800
committerglarkin <glarkin@FreeBSD.org>2011-10-24 23:20:27 +0800
commitb82d6ac61a7b4b326c1a528e1aac7d104967ce9a (patch)
treeafaae7f23ae1f85cd320cf658071055f3efc4f1c
parentbc879d6eb5d869fdb20ba4a9805e36a38b3298ab (diff)
downloadfreebsd-ports-gnome-b82d6ac61a7b4b326c1a528e1aac7d104967ce9a.tar.gz
freebsd-ports-gnome-b82d6ac61a7b4b326c1a528e1aac7d104967ce9a.tar.zst
freebsd-ports-gnome-b82d6ac61a7b4b326c1a528e1aac7d104967ce9a.zip
- Document phpldapadmin - remote PHP code injection vulnerability
PR: ports/161954 Submitted by: Ruslan Mahmatkhanov <cvs-src@yandex.ru>
-rw-r--r--security/vuxml/vuln.xml32
1 files changed, 32 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index e394c2fc9ff2..31511817bf1f 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,38 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="edf47177-fe3f-11e0-a207-0014a5e3cda6">
+ <topic>phpLDAPadmin -- Remote PHP code injection vulnerability</topic>
+ <affects>
+ <package>
+ <name>phpldapadmin</name>
+ <range><ge>1.2.0</ge><lt>1.2.1.1_1,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>EgiX (n0b0d13s at gmail dot com) reports:</p>
+ <blockquote cite="http://packetstormsecurity.org/files/106120/phpldapadmin-inject.txt">
+ <p>The $sortby parameter passed to 'masort' function in file
+ lib/functions.php isn't properly sanitized before being used in
+ a call to create_function() at line 1080. This can be exploited
+ to inject and execute arbitrary PHP code. The only possible attack
+ vector is when handling the 'query_engine' command, in which input
+ passed through $_REQUEST['orderby'] is passed as $sortby parameter
+ to 'masort' function.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://packetstormsecurity.org/files/106120/phpldapadmin-inject.txt</url>
+ <url>http://sourceforge.net/tracker/?func=detail&amp;aid=3417184&amp;group_id=61828&amp;atid=498546</url>
+ </references>
+ <dates>
+ <discovery>2011-10-23</discovery>
+ <entry>2011-10-24</entry>
+ </dates>
+ </vuln>
+
<vuln vid="6d21a287-fce0-11e0-a828-00235a5f2c9a">
<topic>kdelibs4, rekonq -- input validation failure</topic>
<affects>