CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
97.2%
The masort function in lib/functions.php in phpLDAPadmin 1.2.x before 1.2.2 allows remote attackers to execute arbitrary PHP code via the orderby parameter (aka sortby variable) in a query_engine action to cmd.php, as exploited in the wild in October 2011.
Vendor | Product | Version | CPE |
---|---|---|---|
phpldapadmin_project | phpldapadmin | 1.2.0 | cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0:*:*:*:*:*:*:* |
phpldapadmin_project | phpldapadmin | 1.2.0.1 | cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0.1:*:*:*:*:*:*:* |
phpldapadmin_project | phpldapadmin | 1.2.0.2 | cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0.2:*:*:*:*:*:*:* |
phpldapadmin_project | phpldapadmin | 1.2.0.3 | cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0.3:*:*:*:*:*:*:* |
phpldapadmin_project | phpldapadmin | 1.2.0.4 | cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0.4:*:*:*:*:*:*:* |
phpldapadmin_project | phpldapadmin | 1.2.0.5 | cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0.5:*:*:*:*:*:*:* |
phpldapadmin_project | phpldapadmin | 1.2.1 | cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.1:*:*:*:*:*:*:* |
phpldapadmin_project | phpldapadmin | 1.2.1.1 | cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.1.1:*:*:*:*:*:*:* |
dev.metasploit.com/redmine/issues/5820
openwall.com/lists/oss-security/2011/10/24/9
openwall.com/lists/oss-security/2011/10/25/2
osvdb.org/76594
phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin%3Ba=blobdiff%3Bf=lib/functions.php%3Bh=eb160dc9f7d74e563131e21d4c85d7849a0c6638%3Bhp=19fde9974d4e5eb3bfac04bb223ccbefdb98f9a0%3Bhb=76e6dad13ef77c5448b8dfed1a61e4acc7241165%3Bhpb=5d4245f93ae6f065e7535f268e3cd87a23b07744
phpldapadmin.sourceforge.net/wiki/index.php/Main_Page
secunia.com/advisories/46551
secunia.com/advisories/46672
sourceforge.net/tracker/index.php?func=detail&aid=3417184&group_id=61828&atid=498546
www.debian.org/security/2011/dsa-2333
www.exploit-db.com/exploits/18021/
www.securityfocus.com/bid/50331