Articles / Debian: Security update for…

Debian: Security update for phpldapadmin

Two vulnerabilities have been discovered in phpldapadmin, a web based interface for administering LDAP servers. Input appended to the URL in cmd.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site. Input passed to the “orderby” parameter in cmd.php is not properly sanitised before being used in a create_function() function call. This can be exploited to inject and execute arbitrary PHP code. Updated packages are available from security.debian.org.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA-2333-1                    security@debian.org
http://www.debian.org/security/                         Jonathan Wiltshire
Oct 31th, 2011                          http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : phpldapadmin
Vulnerability  : several
Problem type   : remote
Debian-specific: no
Debian bug     : 646754
CVE IDs        : CVE-2011-4075 CVE-2011-4074

Two vulnerabilities have been discovered in phpldapadmin, a web based
interface for administering LDAP servers. The Common Vulnerabilities and
Exposures project identifies the following problems:

CVE-2011-4074

 Input appended to the URL in cmd.php (when "cmd" is set to "_debug") is
 not properly sanitised before being returned to the user. This can be
 exploited to execute arbitrary HTML and script code in a user's browser
 session in context of an affected site.

CVE-2011-4075

 Input passed to the "orderby" parameter in cmd.php (when "cmd" is set to
 "query_engine", "query" is set to "none", and "search" is set to e.g.
 "1") is not properly sanitised in lib/functions.php before being used in a
 "create_function()" function call. This can be exploited to inject and
 execute arbitrary PHP code.


For the oldstable distribution (lenny), these problems have been fixed in
version 1.1.0.5-6+lenny2.

For the stable distribution (squeeze), these problems have been fixed in
version 1.2.0.5-2+squeeze1.

For the testing distribution (wheezy), these problems will be fixed soon.

For the unstable distribution (sid), these problems have been fixed in
version 1.2.0.5-2.1.

We recommend that you upgrade your phpldapadmin packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk6tQ0EACgkQHYflSXNkfP+uCQCeMmNGTEsYJURFndG0Vj7LAicH
qhMAnili/N36OYURQYkY/Bbd873EtlLm
=8Zwg
-----END PGP SIGNATURE-----
Screenshot

Project Spotlight

Kigo Video Converter Ultimate for Mac

A tool for converting and editing videos.

Screenshot

Project Spotlight

Kid3

An efficient tagger for MP3, Ogg/Vorbis, and FLAC files.