Bug 2333324 (CVE-2024-9102)

Summary: CVE-2024-9102 phpldapadmin: phpLDAPadmin: Improper Neutralization of Formula Elements
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: dmitry
Target Milestone: ---Keywords: Security
Target Release: ---Flags: dmitry: needinfo? (bzimport)
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2333325, 2333326, 2333327, 2333328    
Bug Blocks:    

Description OSIDB Bzimport 2024-12-19 14:01:09 UTC
phpLDAPadmin since at least version 1.2.0 through the latest version 1.2.6.7 allows users to export elements from the LDAP directory into a Comma-Separated Value (CSV) file, but it does not neutralize special elements that could be interpreted as a command when the file is opened by a spreadsheet product. Thus, this could lead to CSV Formula Injection.

Comment 2 Dmitry Butskoy 2024-12-20 23:51:17 UTC
Unfortunately it seems that upstream is stalled.

See https://www.redguard.ch/blog/2024/12/19/security-advisory-phpldapadmin/ for more info, as well as upstream itself at https://github.com/leenooks/phpLDAPadmin .

It would be fine if someone with good experience in PHP could help with providing a patch. (Note: still no such a patch in Debian too).