Summary
This host is running phpLDAPadmin and is prone to cross site scripting vulnerability.
Impact
Successful exploitation will allow remote attackers to insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site.
Impact Level: Application
Solution
Apply patch from below link,
http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin a=commit
h=64668e882b8866fae0fa1b25375d1a2f3b4672e2
Insight
The flaw is due to improper validation of user-supplied input appended to the URL in cmd.php (when 'cmd' is set to '_debug'), which allows attackers to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.
Affected
phpLDAPadmin versions 1.2.0 through 1.2.1.1
References
Severity
Classification
-
CVE CVE-2011-4074 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Apache Struts2 'XWork' Information Disclosure Vulnerability
- APC PowerChute Network Shutdown 'security/applet' Cross Site Scripting Vulnerability
- Apache Struts Directory Traversal Vulnerability
- Abtp Portal Project 'ABTPV_BLOQUE_CENT' Parameter Local and Remote File Include Vulnerabilities
- Apache ActiveMQ Source Code Information Disclosure Vulnerability