FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

phpLDAPadmin -- Remote PHP code injection vulnerability

Affected packages
1.2.0 <= phpldapadmin <,1


VuXML ID edf47177-fe3f-11e0-a207-0014a5e3cda6
Discovery 2011-10-23
Entry 2011-10-24

EgiX (n0b0d13s at gmail dot com) reports:

The $sortby parameter passed to 'masort' function in file lib/functions.php isn't properly sanitized before being used in a call to create_function() at line 1080. This can be exploited to inject and execute arbitrary PHP code. The only possible attack vector is when handling the 'query_engine' command, in which input passed through $_REQUEST['orderby'] is passed as $sortby parameter to 'masort' function.