HTTP Request Smuggling Affecting phpldapadmin package, versions <1.2.6.3-0.1


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-PHPLDAPADMIN-7448423
  • published13 Jul 2024
  • disclosed11 Jul 2024

Introduced: 11 Jul 2024

CVE-2016-15039  (opens in a new tab)
CWE-444  (opens in a new tab)

How to fix?

Upgrade Debian:13 phpldapadmin to version 1.2.6.3-0.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream phpldapadmin package and not the phpldapadmin package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

A vulnerability classified as critical was found in mhuertos phpLDAPadmin up to 665dbc2690ebeb5392d38f1fece0a654225a0b38. Affected by this vulnerability is the function makeHttpRequest of the file htdocs/js/ajax_functions.js. The manipulation leads to http request smuggling. The attack can be launched remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named dd6e9583a2eb2ca085583765e8a63df5904cb036. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-270523.