CVE-2011-4075

The masort function in lib/functions.php in phpLDAPadmin 1.2.x before 1.2.2 allows remote attackers to execute arbitrary PHP code via the orderby parameter (aka sortby variable) in a query_engine action to cmd.php, as exploited in the wild in October 2011.
References
Link Resource
http://dev.metasploit.com/redmine/issues/5820 Exploit
http://openwall.com/lists/oss-security/2011/10/24/9 Exploit Patch
http://openwall.com/lists/oss-security/2011/10/25/2 Exploit Patch
http://osvdb.org/76594
http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin%3Ba=blobdiff%3Bf=lib/functions.php%3Bh=eb160dc9f7d74e563131e21d4c85d7849a0c6638%3Bhp=19fde9974d4e5eb3bfac04bb223ccbefdb98f9a0%3Bhb=76e6dad13ef77c5448b8dfed1a61e4acc7241165%3Bhpb=5d4245f93ae6f065e7535f268e3cd87a23b07744
http://phpldapadmin.sourceforge.net/wiki/index.php/Main_Page
http://secunia.com/advisories/46551 Vendor Advisory
http://secunia.com/advisories/46672
http://sourceforge.net/tracker/index.php?func=detail&aid=3417184&group_id=61828&atid=498546
http://www.debian.org/security/2011/dsa-2333
http://www.exploit-db.com/exploits/18021/ Exploit
http://www.securityfocus.com/bid/50331
http://dev.metasploit.com/redmine/issues/5820 Exploit
http://openwall.com/lists/oss-security/2011/10/24/9 Exploit Patch
http://openwall.com/lists/oss-security/2011/10/25/2 Exploit Patch
http://osvdb.org/76594
http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin%3Ba=blobdiff%3Bf=lib/functions.php%3Bh=eb160dc9f7d74e563131e21d4c85d7849a0c6638%3Bhp=19fde9974d4e5eb3bfac04bb223ccbefdb98f9a0%3Bhb=76e6dad13ef77c5448b8dfed1a61e4acc7241165%3Bhpb=5d4245f93ae6f065e7535f268e3cd87a23b07744
http://phpldapadmin.sourceforge.net/wiki/index.php/Main_Page
http://secunia.com/advisories/46551 Vendor Advisory
http://secunia.com/advisories/46672
http://sourceforge.net/tracker/index.php?func=detail&aid=3417184&group_id=61828&atid=498546
http://www.debian.org/security/2011/dsa-2333
http://www.exploit-db.com/exploits/18021/ Exploit
http://www.securityfocus.com/bid/50331
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:phpldapadmin_project:phpldapadmin:1.2.1.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:31

Type Values Removed Values Added
References () http://dev.metasploit.com/redmine/issues/5820 - Exploit () http://dev.metasploit.com/redmine/issues/5820 - Exploit
References () http://openwall.com/lists/oss-security/2011/10/24/9 - Exploit, Patch () http://openwall.com/lists/oss-security/2011/10/24/9 - Exploit, Patch
References () http://openwall.com/lists/oss-security/2011/10/25/2 - Exploit, Patch () http://openwall.com/lists/oss-security/2011/10/25/2 - Exploit, Patch
References () http://osvdb.org/76594 - () http://osvdb.org/76594 -
References () http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin%3Ba=blobdiff%3Bf=lib/functions.php%3Bh=eb160dc9f7d74e563131e21d4c85d7849a0c6638%3Bhp=19fde9974d4e5eb3bfac04bb223ccbefdb98f9a0%3Bhb=76e6dad13ef77c5448b8dfed1a61e4acc7241165%3Bhpb=5d4245f93ae6f065e7535f268e3cd87a23b07744 - () http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin%3Ba=blobdiff%3Bf=lib/functions.php%3Bh=eb160dc9f7d74e563131e21d4c85d7849a0c6638%3Bhp=19fde9974d4e5eb3bfac04bb223ccbefdb98f9a0%3Bhb=76e6dad13ef77c5448b8dfed1a61e4acc7241165%3Bhpb=5d4245f93ae6f065e7535f268e3cd87a23b07744 -
References () http://phpldapadmin.sourceforge.net/wiki/index.php/Main_Page - () http://phpldapadmin.sourceforge.net/wiki/index.php/Main_Page -
References () http://secunia.com/advisories/46551 - Vendor Advisory () http://secunia.com/advisories/46551 - Vendor Advisory
References () http://secunia.com/advisories/46672 - () http://secunia.com/advisories/46672 -
References () http://sourceforge.net/tracker/index.php?func=detail&aid=3417184&group_id=61828&atid=498546 - () http://sourceforge.net/tracker/index.php?func=detail&aid=3417184&group_id=61828&atid=498546 -
References () http://www.debian.org/security/2011/dsa-2333 - () http://www.debian.org/security/2011/dsa-2333 -
References () http://www.exploit-db.com/exploits/18021/ - Exploit () http://www.exploit-db.com/exploits/18021/ - Exploit
References () http://www.securityfocus.com/bid/50331 - () http://www.securityfocus.com/bid/50331 -

Information

Published : 2011-11-02 17:55

Updated : 2024-11-21 01:31


NVD link : CVE-2011-4075

Mitre link : CVE-2011-4075

CVE.ORG link : CVE-2011-4075


JSON object : View

Products Affected

phpldapadmin_project

  • phpldapadmin
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')