A reflected cross-site scripting (XSS) vulnerability in the 'Entry Chooser' of phpLDAPadmin (version 1.2.1 through the latest version, 1.2.6.7) allows attackers to execute arbitrary JavaScript in the user's browser via the 'element' parameter, which is unsafely passed to the JavaScript 'eval' function. However, exploitation is limited to specific conditions where 'opener' is correctly set.
History

Fri, 20 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Dec 2024 14:00:00 +0000

Type Values Removed Values Added
Description A reflected cross-site scripting (XSS) vulnerability in the 'Entry Chooser' of phpLDAPadmin (version 1.2.1 through the latest version, 1.2.6.7) allows attackers to execute arbitrary JavaScript in the user's browser via the 'element' parameter, which is unsafely passed to the JavaScript 'eval' function. However, exploitation is limited to specific conditions where 'opener' is correctly set.
Title phpLDAPadmin: Reflected Cross-Site Scripting in entry_chooser.php
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published: 2024-12-19T13:41:06.610Z

Updated: 2024-12-20T20:20:24.165Z

Reserved: 2024-09-23T13:40:38.311Z

Link: CVE-2024-9101

cve-icon Vulnrichment

Updated: 2024-12-20T20:20:19.287Z

cve-icon NVD

Status : Received

Published: 2024-12-19T14:15:06.147

Modified: 2024-12-19T14:15:06.147

Link: CVE-2024-9101

cve-icon Redhat

No data.