Check Point Reference: | CPAI-2013-2519 |
Date Published: | 13 Oct 2013 |
Severity: | Medium |
Last Updated: | Saturday 04 January, 2025 |
Source: | CVE-2011-4075 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | phpLDAPadmin 1.2.x before 1.2.2 |
Vulnerability Description | A remote code execution vulnerability has been reported in phpLDAPadmin web server. |
Vulnerability Details | The vulnerability is due to improper sanitization of certain parameters. Remote attackers can execute an arbitrary PHP code in a query_engine action to cmd.php. Successful exploitation would allow an attacker to execute arbitrary code on the server. |
This protection will detect and block malicious requests.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Web Server Enforcement Violation
Attack Information: PHP phpLDAPadmin Remote Code Execution