Name | CVE-2024-9102 |
Description | phpLDAPadmin since at least version 1.2.0 through the latest version 1.2.6.7 allows users to export elements from the LDAP directory into a Comma-Separated Value (CSV) file, but it does not neutralize special elements that could be interpreted as a command when the file is opened by a spreadsheet product. Thus, this could lead to CSV Formula Injection. NOTE: This vulnerability will not be addressed, the maintainer's position is that it is not the intention of phpLDAPadmin to control what data Administrators can put in their LDAP database, nor filter it on export. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1090914 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
phpldapadmin (PTS) | bookworm | 1.2.6.3-0.3+deb12u1 | vulnerable |
| sid, trixie | 1.2.6.7-4 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
phpldapadmin | source | (unstable) | (unfixed) | unimportant | | 1090914 |
Notes
https://www.redguard.ch/blog/2024/12/19/security-advisory-phpldapadmin/
Not considered a security vulnerability by upstream. It is not the intention
of phpldapadmin to control what data administrators put in their LDAP database,
nor to filter it on export. Cf.:
https://github.com/leenooks/phpLDAPadmin/issues/274#issuecomment-2586859072