An XSS issue has been discovered in phpLDAPadmin before 1.2.6.2 that allows users to store malicious values that may be executed by other users at a later time via get_request in lib/function.php.
References
Link | Resource |
---|---|
https://bugs.launchpad.net/ubuntu/+source/phpldapadmin/+bug/1906474 | Issue Tracking Third Party Advisory |
https://github.com/leenooks/phpLDAPadmin/commit/c87571f6b7be15d5cd8b26381b6eb31ad03d28e2 | Patch Third Party Advisory |
https://github.com/leenooks/phpLDAPadmin/issues/130 | Exploit Issue Tracking Third Party Advisory |
https://github.com/leenooks/phpLDAPadmin/compare/1.2.5...1.2.6.2 | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XA42XDSUPCOXL5ZCP5RGD3FD4JQQWNX/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6PZH3EY2T66N2MGOA7DWCAIVYIJH4BC/ | Third Party Advisory |
Information
Published : 2020-12-10 21:15
Updated : 2020-12-22 13:16
NVD link : CVE-2020-35132
Mitre link : CVE-2020-35132
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
phpldapadmin_project
- phpldapadmin
fedoraproject
- fedora