Описание
A vulnerability classified as critical was found in mhuertos phpLDAPadmin up to 665dbc2690ebeb5392d38f1fece0a654225a0b38. Affected by this vulnerability is the function makeHttpRequest of the file htdocs/js/ajax_functions.js. The manipulation leads to http request smuggling. The attack can be launched remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named dd6e9583a2eb2ca085583765e8a63df5904cb036. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-270523.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-apps/bionic | needs-triage | |
esm-apps/focal | needs-triage | |
esm-apps/jammy | not-affected | |
esm-apps/noble | not-affected | |
esm-apps/xenial | needs-triage | |
focal | ignored | end of standard support, was needs-triage |
jammy | not-affected | 1.2.6.3-0.2 |
noble | not-affected | |
oracular | not-affected |
Показывать по
Ссылки на источники
6.5 Medium
CVSS2
6.3 Medium
CVSS3
Связанные уязвимости
A vulnerability classified as critical was found in mhuertos phpLDAPadmin up to 665dbc2690ebeb5392d38f1fece0a654225a0b38. Affected by this vulnerability is the function makeHttpRequest of the file htdocs/js/ajax_functions.js. The manipulation leads to http request smuggling. The attack can be launched remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named dd6e9583a2eb2ca085583765e8a63df5904cb036. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-270523.
A vulnerability classified as critical was found in mhuertos phpLDAPad ...
A vulnerability classified as critical was found in mhuertos phpLDAPadmin up to 665dbc2690ebeb5392d38f1fece0a654225a0b38. Affected by this vulnerability is the function makeHttpRequest of the file htdocs/js/ajax_functions.js. The manipulation leads to http request smuggling. The attack can be launched remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named dd6e9583a2eb2ca085583765e8a63df5904cb036. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-270523.
Уязвимость функции makeHttpRequest() файла htdocs/js/ajax_functions.js веб-инструмента администрирования LDAP phpLDAPadmin, позволяющая нарушителю вызвать контрабанду http-запросов
6.5 Medium
CVSS2
6.3 Medium
CVSS3