- Nom du paquet
- Advisory ID
- Affected versions
- MES5 i586 , MES5 x86_64
Multiple vulnerabilities was discovered and corrected in phpldapadmin:
Input appended to the URL in cmd.php \(when cmd is set to _debug\)
is not properly sanitised before being returned to the user. This can
be exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site (CVE-2011-4074).
Input passed to the orderby parameter in cmd.php \(when cmd is set
to query_engine, query is set to none, and search is set to e.g. 1\)
is not properly sanitised in lib/functions.php before being used in
a create_function() function call. This can be exploited to inject
and execute arbitrary PHP code (CVE-2011-4075).
The updated packages have been upgraded to the latest version (1.2.2)
which is not vulnerable to these issues.
aa5dbb658ad22b4444c9d96ebf5ab78e mes5/i586/phpldapadmin-1.2.2-0.1mdvmes5.2.noarch.rpm 0d59873f81f0d993591b4037514768f2 mes5/SRPMS/phpldapadmin-1.2.2-0.1mdvmes5.2.src.rpm
81cdc948bada750eb85795dd4c274c9b mes5/x86_64/phpldapadmin-1.2.2-0.1mdvmes5.2.noarch.rpm 0d59873f81f0d993591b4037514768f2 mes5/SRPMS/phpldapadmin-1.2.2-0.1mdvmes5.2.src.rpm