On Mon, Oct 08, 2018 at 08:55:35PM +0200, Dominik George wrote: > Control: tags -1 + moreinfo > Control: severity -1 important > > Heisann, > > On Sat, Jun 23, 2018 at 10:45:39AM +0200, Moritz Muehlenhoff wrote: > > Package: phpldapadmin > > Severity: grave > > Tags: security > > > > Please see > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12689 > > I am triaging this bug report because of a request of a user to get > phpLDAPAdmin into testing again, and the maintainer seems to be unresponsive. > > Doing so, I found that in my opinion, the CVE is invalid. Neither of the PoC > works. > > PoC 1 (server_id parameter) does not work because the parameter is verified > using is_numeric before being passed on to anything special. > > PoC 2 makes phpLDAPAdmin simply display "Invalid DN syntax for user". > > No matter what, I was not able to get anything out of phpLDAPAdmin with the > information in the CVE and the refereces exploit. Thus, I am lowering the > priority of this bug report to important and asking you to provide more > information on how to produce the behaviour claimed in the CVE report.
We're just filing these bugs as they come in from MITRE, I don't even use phpldapadmin and most probably never will. I suggest you report this upstream and if they agree that it's confirmed to be a non-issue, ask for a rejection via https://cveform.mitre.org/. Cheers, Moritz