CVE-2006-2016
Multiple cross-site scripting (XSS) vulnerabilities in phpLDAPadmin 0.9.8 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) dn parameter in (a) compare_form.php, (b) copy_form.php, (c) rename_form.php, (d) template_engine.php, and (e) delete_form.php; (2) scope parameter in (f) search.php; and (3) Container DN, (4) Machine Name, and (5) UID Number fields in (g) template_engine.php.
Published
2006-04-25T12:50:00.000
Last Modified
2025-04-03T01:03:51.193
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 2.6 (LOW)
CVSSv2 Vector
AV:N/AC:H/Au:N/C:N/I:P/A:N
- Access Vector: NETWORK
- Access Complexity: HIGH
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: PARTIAL
- Availability Impact: NONE
Exploitability Score
4.9
Impact Score
2.9
Weaknesses
Affected Vendors & Products
References
-
http://pridels0.blogspot.com/2006/04/phpldapadmin-multiple-vuln.html
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/19747
Exploit, Third Party Advisory
([email protected])
-
http://secunia.com/advisories/20124
Third Party Advisory
([email protected])
-
http://www.debian.org/security/2006/dsa-1057
Third Party Advisory
([email protected])
-
http://www.osvdb.org/24788
Broken Link, Exploit
([email protected])
-
http://www.osvdb.org/24789
Broken Link, Exploit
([email protected])
-
http://www.osvdb.org/24790
Broken Link, Exploit
([email protected])
-
http://www.osvdb.org/24792
Broken Link, Exploit
([email protected])
-
http://www.osvdb.org/24793
Broken Link, Exploit
([email protected])
-
http://www.osvdb.org/24794
Broken Link, Exploit
([email protected])
-
http://www.securityfocus.com/bid/17643
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
http://www.vupen.com/english/advisories/2006/1450
Permissions Required
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25958
Third Party Advisory, VDB Entry
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25959
Third Party Advisory, VDB Entry
([email protected])
-
http://pridels0.blogspot.com/2006/04/phpldapadmin-multiple-vuln.html
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/19747
Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/20124
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.debian.org/security/2006/dsa-1057
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.osvdb.org/24788
Broken Link, Exploit
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.osvdb.org/24789
Broken Link, Exploit
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.osvdb.org/24790
Broken Link, Exploit
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.osvdb.org/24792
Broken Link, Exploit
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.osvdb.org/24793
Broken Link, Exploit
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.osvdb.org/24794
Broken Link, Exploit
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/17643
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2006/1450
Permissions Required
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25958
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25959
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)