Phpldapadmin orderby Remote Code Execution Exploit

Input passed to the "orderby" parameter in cmd.php (when "cmd" is set to "query_engine", "query" is set to "none", and "search" is set to e.g. "1") is not properly sanitised in lib/functions.php before being used in a "create_function()" function call. This can be exploited to inject and execute arbitrary PHP code.
Exploit type: 
Vulnerabilty ID: 
Product Version: 
Released Date: 
Wednesday, January 4, 2012 - 00:00