CVE-2024-9101
Publication date 19 December 2024
Last updated 1 January 2025
Ubuntu priority
Description
A reflected cross-site scripting (XSS) vulnerability in the 'Entry Chooser' of phpLDAPadmin (version 1.2.1 through the latest version, 1.2.6.7) allows attackers to execute arbitrary JavaScript in the user's browser via the 'element' parameter, which is unsafely passed to the JavaScript 'eval' function. However, exploitation is limited to specific conditions where 'opener' is correctly set.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| phpldapadmin | 25.10 questing |
Needs evaluation
|
| 24.04 LTS noble |
Needs evaluation
|
|
| 22.04 LTS jammy |
Needs evaluation
|
|
| 20.04 LTS focal |
Needs evaluation
|
|
| 18.04 LTS bionic |
Needs evaluation
|
|
| 16.04 LTS xenial |
Needs evaluation
|
References
Other references
- https://www.cve.org/CVERecord?id=CVE-2024-9101
- https://www.redguard.ch/blog/2024/12/19/security-advisory-phpldapadmin/
- https://github.com/leenooks/phpLDAPadmin/blob/master/htdocs/entry_chooser.php
- https://github.com/leenooks/phpLDAPadmin/commit/f713afc8d164169516c91b0988531f2accb9bce6#diff-c2d6d7678ada004e704ee055169395a58227aaec86a6f75fa74ca18ff49bca44R27
- https://sourceforge.net/projects/phpldapadmin/files/phpldapadmin-php5/1.2.1/