CVE-2005-1921
Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.
Published
2005-07-05T04:00:00.000
Last Modified
2025-04-03T01:03:51.193
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 7.5 (HIGH)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: PARTIAL
- Availability Impact: PARTIAL
Exploitability Score
10.0
Impact Score
6.4
Weaknesses
Affected Vendors & Products
References
-
http://marc.info/?l=bugtraq&m=112008638320145&w=2
Third Party Advisory
([email protected])
-
http://marc.info/?l=bugtraq&m=112015336720867&w=2
Third Party Advisory
([email protected])
-
http://marc.info/?l=bugtraq&m=112605112027335&w=2
Third Party Advisory
([email protected])
-
http://pear.php.net/package/XML_RPC/download/1.3.1
Patch, Product
([email protected])
-
http://secunia.com/advisories/15810
Broken Link
([email protected])
-
http://secunia.com/advisories/15852
Broken Link
([email protected])
-
http://secunia.com/advisories/15855
Broken Link
([email protected])
-
http://secunia.com/advisories/15861
Broken Link
([email protected])
-
http://secunia.com/advisories/15872
Broken Link
([email protected])
-
http://secunia.com/advisories/15883
Broken Link
([email protected])
-
http://secunia.com/advisories/15884
Broken Link
([email protected])
-
http://secunia.com/advisories/15895
Broken Link
([email protected])
-
http://secunia.com/advisories/15903
Broken Link
([email protected])
-
http://secunia.com/advisories/15904
Broken Link
([email protected])
-
http://secunia.com/advisories/15916
Broken Link
([email protected])
-
http://secunia.com/advisories/15917
Broken Link
([email protected])
-
http://secunia.com/advisories/15922
Broken Link
([email protected])
-
http://secunia.com/advisories/15944
Broken Link
([email protected])
-
http://secunia.com/advisories/15947
Broken Link
([email protected])
-
http://secunia.com/advisories/15957
Broken Link
([email protected])
-
http://secunia.com/advisories/16001
Broken Link
([email protected])
-
http://secunia.com/advisories/16339
Broken Link
([email protected])
-
http://secunia.com/advisories/16693
Broken Link
([email protected])
-
http://secunia.com/advisories/17440
Broken Link
([email protected])
-
http://secunia.com/advisories/17674
Broken Link
([email protected])
-
http://secunia.com/advisories/18003
Broken Link
([email protected])
-
http://security.gentoo.org/glsa/glsa-200507-01.xml
Third Party Advisory
([email protected])
-
http://security.gentoo.org/glsa/glsa-200507-06.xml
Third Party Advisory
([email protected])
-
http://security.gentoo.org/glsa/glsa-200507-07.xml
Third Party Advisory
([email protected])
-
http://securitytracker.com/id?1015336
Broken Link, Third Party Advisory, VDB Entry
([email protected])
-
http://sourceforge.net/project/showfiles.php?group_id=87163
Product
([email protected])
-
http://sourceforge.net/project/shownotes.php?release_id=338803
Broken Link
([email protected])
-
http://www.ampache.org/announce/3_3_1_2.php
Broken Link
([email protected])
-
http://www.debian.org/security/2005/dsa-745
Mailing List, Third Party Advisory
([email protected])
-
http://www.debian.org/security/2005/dsa-746
Mailing List, Third Party Advisory
([email protected])
-
http://www.debian.org/security/2005/dsa-747
Mailing List, Third Party Advisory
([email protected])
-
http://www.debian.org/security/2005/dsa-789
Mailing List, Third Party Advisory
([email protected])
-
http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt
Third Party Advisory
([email protected])
-
http://www.gulftech.org/?node=research&article_id=00087-07012005
Not Applicable, Vendor Advisory
([email protected])
-
http://www.hardened-php.net/advisory-022005.php
Not Applicable
([email protected])
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:109
Patch, Third Party Advisory, Vendor Advisory
([email protected])
-
http://www.novell.com/linux/security/advisories/2005_18_sr.html
Broken Link
([email protected])
-
http://www.novell.com/linux/security/advisories/2005_41_php_pear.html
Broken Link
([email protected])
-
http://www.novell.com/linux/security/advisories/2005_49_php.html
Broken Link
([email protected])
-
http://www.redhat.com/support/errata/RHSA-2005-564.html
Broken Link
([email protected])
-
http://www.securityfocus.com/archive/1/419064/100/0/threaded
Broken Link, Third Party Advisory, VDB Entry
([email protected])
-
http://www.securityfocus.com/archive/1/419064/100/0/threaded
Broken Link, Third Party Advisory, VDB Entry
([email protected])
-
http://www.securityfocus.com/bid/14088
Broken Link, Third Party Advisory, VDB Entry
([email protected])
-
http://www.vupen.com/english/advisories/2005/2827
Broken Link
([email protected])
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294
Broken Link
([email protected])
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350
Broken Link
([email protected])
-
http://marc.info/?l=bugtraq&m=112008638320145&w=2
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://marc.info/?l=bugtraq&m=112015336720867&w=2
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://marc.info/?l=bugtraq&m=112605112027335&w=2
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://pear.php.net/package/XML_RPC/download/1.3.1
Patch, Product
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/15810
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/15852
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/15855
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/15861
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/15872
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/15883
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/15884
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/15895
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/15903
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/15904
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/15916
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/15917
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/15922
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/15944
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/15947
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/15957
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/16001
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/16339
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/16693
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/17440
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/17674
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/18003
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://security.gentoo.org/glsa/glsa-200507-01.xml
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://security.gentoo.org/glsa/glsa-200507-06.xml
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://security.gentoo.org/glsa/glsa-200507-07.xml
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://securitytracker.com/id?1015336
Broken Link, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://sourceforge.net/project/showfiles.php?group_id=87163
Product
(af854a3a-2127-422b-91ae-364da2661108)
-
http://sourceforge.net/project/shownotes.php?release_id=338803
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.ampache.org/announce/3_3_1_2.php
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.debian.org/security/2005/dsa-745
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.debian.org/security/2005/dsa-746
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.debian.org/security/2005/dsa-747
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.debian.org/security/2005/dsa-789
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.gulftech.org/?node=research&article_id=00087-07012005
Not Applicable, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.hardened-php.net/advisory-022005.php
Not Applicable
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:109
Patch, Third Party Advisory, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.novell.com/linux/security/advisories/2005_18_sr.html
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.novell.com/linux/security/advisories/2005_41_php_pear.html
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.novell.com/linux/security/advisories/2005_49_php.html
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.redhat.com/support/errata/RHSA-2005-564.html
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/archive/1/419064/100/0/threaded
Broken Link, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/archive/1/419064/100/0/threaded
Broken Link, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/14088
Broken Link, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2005/2827
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)