CVE-2024-9102

NameCVE-2024-9102
DescriptionphpLDAPadmin since at least version 1.2.0 through the latest version 1.2.6.7 allows users to export elements from the LDAP directory into a Comma-Separated Value (CSV) file, but it does not neutralize special elements that could be interpreted as a command when the file is opened by a spreadsheet product. Thus, this could lead to CSV Formula Injection. NOTE: This vulnerability will not be addressed, the maintainer's position is that it is not the intention of phpLDAPadmin to control what data Administrators can put in their LDAP database, nor filter it on export.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1090914

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
phpldapadmin (PTS)bookworm1.2.6.3-0.3+deb12u1vulnerable
sid, trixie1.2.6.7-4vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
phpldapadminsource(unstable)(unfixed)unimportant1090914

Notes

https://www.redguard.ch/blog/2024/12/19/security-advisory-phpldapadmin/
Not considered a security vulnerability by upstream. It is not the intention
of phpldapadmin to control what data administrators put in their LDAP database,
nor to filter it on export. Cf.:
https://github.com/leenooks/phpLDAPadmin/issues/274#issuecomment-2586859072

Search for package or bug name: Reporting problems