cve/2024/CVE-2024-9101.md

19 lines
1.1 KiB
Markdown
Raw Permalink Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-9101](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9101)
![](https://img.shields.io/static/v1?label=Product&message=phpLDAPadmin&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=1.2.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=1.2.6.7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
A reflected cross-site scripting (XSS) vulnerability in the 'Entry Chooser' of phpLDAPadmin (version 1.2.1 through the latest version, 1.2.6.7) allows attackers to execute arbitrary JavaScript in the user's browser via the 'element' parameter, which is unsafely passed to the JavaScript 'eval' function. However, exploitation is limited to specific conditions where 'opener' is correctly set.
### POC
#### Reference
- https://www.redguard.ch/blog/2024/12/19/security-advisory-phpldapadmin/
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/fkie-cad/nvd-json-data-feeds
2025-09-29 16:08:36 +00:00