phpLDAPadmin 0.9.8 - 'rename_form.php' Cross-Site Scripting
Author: r0t
type: webapps
platform: php
port:
date_added: 2006-04-21
date_updated: 2017-01-06
verified: 1
codes: CVE-2006-2016;OSVDB-24790
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comphpldapadmin-0.9.8.zip
source: https://www.securityfocus.com/bid/17643/info
PHPLDAPAdmin is prone to multiple input-validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
An attacker can exploit these issues to execute arbitrary HTML and script code in the browser of a victim user in the context of the affected website. This may allow the attacker to steal cookie-based authentication credentials, to control how the site is rendered to the user, and to launch other attacks.
http://www.example.com/rename_form.php?server_id=0&dn=%22%3Cscript%3Ealert('r0t')%3C/script%3E