A reflected cross-site scripting (XSS) vulnerability in the 'Entry Chooser' of phpLDAPadmin (version 1.2.1 through the latest version, 1.2.6.7) allows attackers to execute arbitrary JavaScript in the user's browser via the 'element' parameter, which is unsafely passed to the JavaScript 'eval' function. However, exploitation is limited to specific conditions where 'opener' is correctly set.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 19 Dec 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A reflected cross-site scripting (XSS) vulnerability in the 'Entry Chooser' of phpLDAPadmin (version 1.2.1 through the latest version, 1.2.6.7) allows attackers to execute arbitrary JavaScript in the user's browser via the 'element' parameter, which is unsafely passed to the JavaScript 'eval' function. However, exploitation is limited to specific conditions where 'opener' is correctly set. | |
Title | phpLDAPadmin: Reflected Cross-Site Scripting in entry_chooser.php | |
Weaknesses | CWE-79 | |
References |
|
|
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: NCSC.ch
Published: 2024-12-19T13:41:06.610Z
Updated: 2024-12-20T20:20:24.165Z
Reserved: 2024-09-23T13:40:38.311Z
Link: CVE-2024-9101
Vulnrichment
Updated: 2024-12-20T20:20:19.287Z
NVD
Status : Received
Published: 2024-12-19T14:15:06.147
Modified: 2024-12-19T14:15:06.147
Link: CVE-2024-9101
Redhat
No data.