First published: Tue Apr 25 2006(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in phpLDAPadmin 0.9.8 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) dn parameter in (a) compare_form.php, (b) copy_form.php, (c) rename_form.php, (d) template_engine.php, and (e) delete_form.php; (2) scope parameter in (f) search.php; and (3) Container DN, (4) Machine Name, and (5) UID Number fields in (g) template_engine.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
phpLDAPadmin | <=0.9.8 | |
Debian Linux | =3.1 | |
Debian Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2016 has a moderate severity rating due to its potential for remote code execution through XSS attacks.
To fix CVE-2006-2016, upgrade phpLDAPadmin to version 0.9.9 or later, which addresses these vulnerabilities.
CVE-2006-2016 affects phpLDAPadmin versions 0.9.8 and earlier, as well as specific versions of Debian GNU/Linux 3.0 and 3.1.
CVE-2006-2016 can be exploited through cross-site scripting (XSS) attacks allowing attackers to execute arbitrary scripts in users' browsers.
Users and administrators of phpLDAPadmin prior to version 0.9.9, especially those using Debian versions 3.0 and 3.1, are at risk due to CVE-2006-2016.