header-logo
Suggest Exploit
vendor:
PHPLDAPAdmin
by:
SecurityFocus
7.5
CVSS
HIGH
Input-Validation Vulnerabilities
20
CWE
Product Name: PHPLDAPAdmin
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

PHPLDAPAdmin Multiple Input-Validation Vulnerabilities

PHPLDAPAdmin is prone to multiple input-validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. An attacker can exploit these issues to execute arbitrary HTML and script code in the browser of a victim user in the context of the affected website. This may allow the attacker to steal cookie-based authentication credentials, to control how the site is rendered to the user, and to launch other attacks.

Mitigation:

Input validation should be used to ensure that untrusted data is not allowed to affect the application's control flow or the data that it manipulates.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/17643/info
     
PHPLDAPAdmin is prone to multiple input-validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
     
An attacker can exploit these issues to execute arbitrary HTML and script code in the browser of a victim user in the context of the affected website. This may allow the attacker to steal cookie-based authentication credentials, to control how the site is rendered to the user, and to launch other attacks.

http://www.example.com/template_engine.php?server_id=0&dn=%22%3Cscript%3Ealert('r0t')%3C/script%3E