18889 : XML-RPC for PHP (PHPXMLRPC) Nested XML Tags Arbitrary PHP Code Execution
Printer | http://osvdb.org/18889 | Email This | Edit Vulnerability

Views This Week Views All Time Added to OSVDB Last Modified Modified (since 2008) Percent Complete
5 1075 over 8 years ago about 6 years ago 0 times 90%

Timeline

Disclosure Date
2005-08-15

Description

XML-RPC for PHP (PHPXMLRPC) contains a flaw that may allow a remote attacker to execute arbitrary PHP code. The problem is that the library does not properly sanitizing certain XML tags that are nested in a parsed PHP document before being used in an 'eval()' call, which may allow a remote attacker to execute arbitrary PHP code resulting in a loss of integrity.

Classification

Location: Remote / Network Access
Attack Type: Input Manipulation
Impact: Loss of Integrity
Disclosure: Vendor Verified
OSVDB: Web Related

Solution

Contact your vendor for an appropriate upgrade. An upgrade is required as there are no known workarounds.

Products

Gaetano Giunta
XML-RPC for PHP
1.1.1
Stig S. Bakken
PEAR XML_RPC
1.3.3
Drupal
Drupal
4.5.4
4.5.3
4.5.2
4.5.1
4.5.0
Luis Argerich
TikiWiki
1.8.5
Thorsten Rinne
phpMyFAQ
1.4.10
1.5.0 RC6
Steve Wainstead
PhpWiki
1.2.10
Wouter Demuynck
Nucleus CMS
3.2
Ralf Becker
eGroupWare
1.0.0.008-2
Joseph Engo
phpGroupWare
0.9.16.006
Akos Maroy
LiveSupport
1.0RC1
Steve Freegard
MailWatch for MailScanner
1.0.1
Matthew McNaney
phpWebSite
0.10.1
Fran├žois PLANQUE
b2evolution
0.9.0
PHPAdsNew
PHPAdsNew
2.0.4

References

Tools & Filters

19491 19518 19532 19533 19534 19538 19568 19574 19667 19668 19809 19818 19846 19859 19863 19902 20578 21527
3308

Credit

  • Stefan Esser - sesserhardened-php.net - www.hardened-php.net

CVSSv2 Score

CVSSv2 Base Score = 5.0
Source: nvd.nist.gov | Generated: 2005-08-15 | Disagree?

Access_vector_2 Access_complexity_2 Authentication_2 Confidentiality_impact_0 Integrity_impact_1 Availability_impact_0

Comments

No Comments.

The database information may change without any notice. Use of the information constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the copyright holder or distributor (OSVDB or OSF) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

© Copyright 2002 - 2014 Open Sourced Vulnerability Database (OSVDB), All Rights Reserved.
Privacy Statement - Terms of Use