CVE-2024-9101
LowVulnerability Description
A reflected cross-site scripting (XSS) vulnerability in the 'Entry Chooser' of phpLDAPadmin (version 1.2.1 through the latest version, 1.2.6.7) allows attackers to execute arbitrary JavaScript in the user's browser via the 'element' parameter, which is unsafely passed to the JavaScript 'eval' function. However, exploitation is limited to specific conditions where 'opener' is correctly set.
References & Resources
-
https://github.com/leenooks/phpLDAPadmin/blob/master/htdocs/entry_chooser.phpvulnerability@ncsc.ch
-
https://github.com/leenooks/phpLDAPadmin/commit/f713afc8d164169516c91b0988531f2accb9bce6#diff-c2d6d7678ada004e704ee055169395a58227aaec86a6f75fa74ca18ff49bca44R27vulnerability@ncsc.ch
-
https://sourceforge.net/projects/phpldapadmin/files/phpldapadmin-php5/1.2.1/vulnerability@ncsc.ch
-
https://www.redguard.ch/blog/2024/12/19/security-advisory-phpldapadmin/vulnerability@ncsc.ch
Severity Details
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- Description
- The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
- Exploit Likelihood
- High
- Typical Severity
- Medium
- OWASP Top 10
- A03:2021-Injection
- Abstraction Level
- Base
Key Information
- Published Date
- December 19, 2024
External Resources
Related News Articles
Latest news and updates about CVE-2024-9101
