FreeBSD : phpLDAPadmin -- Remote PHP code injection vulnerability (edf47177-fe3f-11e0-a207-0014a5e3cda6)

high Nessus Plugin ID 56588

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

EgiX (n0b0d13s at gmail dot com) reports :

The $sortby parameter passed to 'masort' function in file lib/functions.php isn't properly sanitized before being used in a call to create_function() at line 1080. This can be exploited to inject and execute arbitrary PHP code. The only possible attack vector is when handling the 'query_engine' command, in which input passed through $_REQUEST['orderby'] is passed as $sortby parameter to 'masort' function.

Solution

Update the affected package.

See Also

https://packetstormsecurity.com/files/106120/phpldapadmin-inject.txt

http://www.nessus.org/u?3720b14a

http://www.nessus.org/u?5bff0b3a

Plugin Details

Severity: High

ID: 56588

File Name: freebsd_pkg_edf47177fe3f11e0a2070014a5e3cda6.nasl

Version: 1.7

Type: local

Published: 10/24/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:phpldapadmin, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 10/24/2011

Vulnerability Publication Date: 10/23/2011