Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2011-4074 First vendor Publication 2011-11-02
Vendor Cve Last vendor Modification 2023-02-13

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Cross-site scripting (XSS) vulnerability in cmd.php in phpLDAPadmin 1.2.x before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via an _debug command.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4074

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:14902
 
Oval ID: oval:org.mitre.oval:def:14902
Title: DSA-2333-1 phpldapadmin -- several
Description: Two vulnerabilities have been discovered in phpldapadmin, a web based interface for administering LDAP servers. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2011-4074 Input appended to the URL in cmd.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. CVE-2011-4075 Input passed to the "orderby" parameter in cmd.php is not properly sanitised in lib/functions.php before being used in a "create_function" function call. This can be exploited to inject and execute arbitrary PHP code.
Family: unix Class: patch
Reference(s): DSA-2333-1
CVE-2011-4075
CVE-2011-4074
Version: 5
Platform(s): Debian GNU/Linux 5.0
Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): phpldapadmin
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8

OpenVAS Exploits

Date Description
2012-04-02 Name : Fedora Update for phpldapadmin FEDORA-2011-14924
File : nvt/gb_fedora_2011_14924_phpldapadmin_fc16.nasl
2012-02-11 Name : Debian Security Advisory DSA 2333-1 (phpldapadmin)
File : nvt/deb_2333_1.nasl
2011-11-25 Name : Fedora Update for phpldapadmin FEDORA-2011-14986
File : nvt/gb_fedora_2011_14986_phpldapadmin_fc14.nasl
2011-11-25 Name : Fedora Update for phpldapadmin FEDORA-2011-14993
File : nvt/gb_fedora_2011_14993_phpldapadmin_fc15.nasl
2011-11-03 Name : Mandriva Update for phpldapadmin MDVSA-2011:163 (phpldapadmin)
File : nvt/gb_mandriva_MDVSA_2011_163.nasl
2011-11-03 Name : phpLDAPadmin '_debug' Cross Site Scripting Vulnerability
File : nvt/gb_phpldapadmin_debug_xss_vuln.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
76593 phpLDAPadmin cmd.php URI XSS

phpLDAPadmin contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate input passed via the URL upon submission to the cmd.php script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.

Nessus® Vulnerability Scanner

Date Description
2011-11-26 Name : The remote Fedora host is missing a security update.
File : fedora_2011-14924.nasl - Type : ACT_GATHER_INFO
2011-11-26 Name : The remote Fedora host is missing a security update.
File : fedora_2011-14986.nasl - Type : ACT_GATHER_INFO
2011-11-26 Name : The remote Fedora host is missing a security update.
File : fedora_2011-14993.nasl - Type : ACT_GATHER_INFO
2011-10-31 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2333.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/50331
CONFIRM http://phpldapadmin.sourceforge.net/wiki/index.php/Main_Page
DEBIAN http://www.debian.org/security/2011/dsa-2333
MISC http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldap...
MLIST http://openwall.com/lists/oss-security/2011/10/24/9
http://openwall.com/lists/oss-security/2011/10/25/2
OSVDB http://osvdb.org/76593
SECUNIA http://secunia.com/advisories/46551
http://secunia.com/advisories/46672

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2023-02-13 05:28:34
  • Multiple Updates
2021-05-04 12:17:46
  • Multiple Updates
2021-04-22 01:21:03
  • Multiple Updates
2020-11-09 17:22:47
  • Multiple Updates
2020-05-23 00:32:06
  • Multiple Updates
2016-06-28 18:52:52
  • Multiple Updates
2016-04-26 21:11:57
  • Multiple Updates
2014-02-17 11:05:55
  • Multiple Updates
2013-05-10 23:10:02
  • Multiple Updates