Vulnerability Name:

CVE-2020-35132 (CCN-193021)

Assigned:2020-12-01
Published:2020-12-01
Updated:2020-12-22
Summary:An XSS issue has been discovered in phpLDAPadmin before 1.2.6.2 that allows users to store malicious values that may be executed by other users at a later time via get_request in lib/function.php.
CVSS v3 Severity:5.4 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)
5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:H/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
7.2 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N)
7.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:H/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-79
Vulnerability Consequences:Cross-Site Scripting
References:Source: MITRE
Type: CNA
CVE-2020-35132

Source: MISC
Type: Issue Tracking, Third Party Advisory
https://bugs.launchpad.net/ubuntu/+source/phpldapadmin/+bug/1906474

Source: XF
Type: UNKNOWN
phpldapadmin-cve202035132-xss(193021)

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/leenooks/phpLDAPadmin/commit/c87571f6b7be15d5cd8b26381b6eb31ad03d28e2

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/leenooks/phpLDAPadmin/compare/1.2.5...1.2.6.2

Source: CCN
Type: phpLDAPadmin GIT Repository
XSS in cmd.php for 1.2.5 #130

Source: MISC
Type: Exploit, Issue Tracking, Third Party Advisory
https://github.com/leenooks/phpLDAPadmin/issues/130

Source: FEDORA
Type: Third Party Advisory
FEDORA-2020-6cc5654c0e

Source: FEDORA
Type: Third Party Advisory
FEDORA-2020-c6fa47ecd7

Vulnerable Configuration:Configuration 1:
  • cpe:/a:phpldapadmin_project:phpldapadmin:*:*:*:*:*:*:*:* (Version < 1.2.6.2)

  • Configuration 2:
  • cpe:/o:fedoraproject:fedora:32:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:33:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    phpldapadmin_project phpldapadmin *
    fedoraproject fedora 32
    fedoraproject fedora 33