An XSS issue has been discovered in phpLDAPadmin before 1.2.6.2 that allows users to store malicious values that may be executed by other users at a later time via get_request in lib/function.php.
References
Link | Resource |
---|---|
https://bugs.launchpad.net/ubuntu/+source/phpldapadmin/+bug/1906474 | Issue Tracking Third Party Advisory |
https://github.com/leenooks/phpLDAPadmin/commit/c87571f6b7be15d5cd8b26381b6eb31ad03d28e2 | Patch Third Party Advisory |
https://github.com/leenooks/phpLDAPadmin/compare/1.2.5...1.2.6.2 | Patch Third Party Advisory |
https://github.com/leenooks/phpLDAPadmin/issues/130 | Exploit Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XA42XDSUPCOXL5ZCP5RGD3FD4JQQWNX/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6PZH3EY2T66N2MGOA7DWCAIVYIJH4BC/ |
Configurations
History
No history.
Information
Published : 2020-12-11 05:15
Updated : 2023-11-07 03:21
NVD link : CVE-2020-35132
Mitre link : CVE-2020-35132
CVE.ORG link : CVE-2020-35132
JSON object : View
Products Affected
fedoraproject
- fedora
phpldapadmin_project
- phpldapadmin
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')