FreeBSD : phpLDAPadmin -- Remote PHP code injection vulnerability (edf47177-fe3f-11e0-a207-0014a5e3cda6)

High Nessus Plugin ID 56588


The remote FreeBSD host is missing a security-related update.


EgiX (n0b0d13s at gmail dot com) reports :

The $sortby parameter passed to 'masort' function in file lib/functions.php isn't properly sanitized before being used in a call to create_function() at line 1080. This can be exploited to inject and execute arbitrary PHP code. The only possible attack vector is when handling the 'query_engine' command, in which input passed through $_REQUEST['orderby'] is passed as $sortby parameter to 'masort' function.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 56588

File Name: freebsd_pkg_edf47177fe3f11e0a2070014a5e3cda6.nasl

Version: $Revision: 1.3 $

Type: local

Published: 2011/10/24

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:phpldapadmin, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2011/10/24

Vulnerability Publication Date: 2011/10/23