Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name MDVSA-2011:163 First vendor Publication 2011-11-02
Vendor Mandriva Last vendor Modification 2011-11-02
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple vulnerabilities was discovered and corrected in phpldapadmin:

Input appended to the URL in cmd.php \(when cmd is set to _debug\) is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site (CVE-2011-4074).

Input passed to the orderby parameter in cmd.php \(when cmd is set to query_engine, query is set to none, and search is set to e.g. 1\) is not properly sanitised in lib/functions.php before being used in a create_function() function call. This can be exploited to inject and execute arbitrary PHP code (CVE-2011-4075).

The updated packages have been upgraded to the latest version (1.2.2) which is not vulnerable to these issues.

Original Source

Url : http://www.mandriva.com/security/advisories?name=MDVSA-2011:163

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-94 Failure to Control Generation of Code ('Code Injection')
50 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:14902
 
Oval ID: oval:org.mitre.oval:def:14902
Title: DSA-2333-1 phpldapadmin -- several
Description: Two vulnerabilities have been discovered in phpldapadmin, a web based interface for administering LDAP servers. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2011-4074 Input appended to the URL in cmd.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. CVE-2011-4075 Input passed to the "orderby" parameter in cmd.php is not properly sanitised in lib/functions.php before being used in a "create_function" function call. This can be exploited to inject and execute arbitrary PHP code.
Family: unix Class: patch
Reference(s): DSA-2333-1
CVE-2011-4075
CVE-2011-4074
Version: 5
Platform(s): Debian GNU/Linux 5.0
Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): phpldapadmin
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8

OpenVAS Exploits

Date Description
2012-04-02 Name : Fedora Update for phpldapadmin FEDORA-2011-14924
File : nvt/gb_fedora_2011_14924_phpldapadmin_fc16.nasl
2012-02-11 Name : Debian Security Advisory DSA 2333-1 (phpldapadmin)
File : nvt/deb_2333_1.nasl
2011-11-25 Name : Fedora Update for phpldapadmin FEDORA-2011-14986
File : nvt/gb_fedora_2011_14986_phpldapadmin_fc14.nasl
2011-11-25 Name : Fedora Update for phpldapadmin FEDORA-2011-14993
File : nvt/gb_fedora_2011_14993_phpldapadmin_fc15.nasl
2011-11-03 Name : Mandriva Update for phpldapadmin MDVSA-2011:163 (phpldapadmin)
File : nvt/gb_mandriva_MDVSA_2011_163.nasl
2011-11-03 Name : phpLDAPadmin '_debug' Cross Site Scripting Vulnerability
File : nvt/gb_phpldapadmin_debug_xss_vuln.nasl
2011-10-25 Name : phpLDAPadmin 'functions.php' Remote PHP Code Injection Vulnerability
File : nvt/gb_phpldapadmin_50331.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
76594 phpLDAPadmin cmd.php orderby Parameter Arbitrary PHP Code Execution

phpLDAPadmin contains a flaw related to the lib/functions.php script failing to properly sanitize input passed to the cmd.php script via the 'orderby' parameter before use in a 'create_function()' function call. This may allow a remote attacker to execute arbitrary PHP code.
76593 phpLDAPadmin cmd.php URI XSS

phpLDAPadmin contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate input passed via the URL upon submission to the cmd.php script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.

Nessus® Vulnerability Scanner

Date Description
2011-11-26 Name : The remote Fedora host is missing a security update.
File : fedora_2011-14924.nasl - Type : ACT_GATHER_INFO
2011-11-26 Name : The remote Fedora host is missing a security update.
File : fedora_2011-14986.nasl - Type : ACT_GATHER_INFO
2011-11-26 Name : The remote Fedora host is missing a security update.
File : fedora_2011-14993.nasl - Type : ACT_GATHER_INFO
2011-11-03 Name : The remote web server hosts a PHP application that can be abused to execute a...
File : phpldapadmin_orderby_cmd_exec.nasl - Type : ACT_ATTACK
2011-10-31 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2333.nasl - Type : ACT_GATHER_INFO