FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

phpLDAPadmin -- Remote PHP code injection vulnerability

Affected packages
1.2.0 <= phpldapadmin < 1.2.1.1_1,1

Details

VuXML ID edf47177-fe3f-11e0-a207-0014a5e3cda6
Discovery 2011-10-23
Entry 2011-10-24

EgiX (n0b0d13s at gmail dot com) reports:

The $sortby parameter passed to 'masort' function in file lib/functions.php isn't properly sanitized before being used in a call to create_function() at line 1080. This can be exploited to inject and execute arbitrary PHP code. The only possible attack vector is when handling the 'query_engine' command, in which input passed through $_REQUEST['orderby'] is passed as $sortby parameter to 'masort' function.

References

URL http://packetstormsecurity.org/files/106120/phpldapadmin-inject.txt
URL http://sourceforge.net/tracker/?func=detail&aid=3417184&group_id=61828&atid=498546