GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sun Jul 03, 2005 4:53 pm Post subject: [ GLSA 200507-01 ] PEAR XML-RPC, phpxmlrpc: PHP script injec |
|
|
Gentoo Linux Security Advisory
Title: PEAR XML-RPC, phpxmlrpc: PHP script injection vulnerability (GLSA 200507-01)
Severity: high
Exploitable: remote
Date: July 03, 2005
Bug(s): #97399, #97629
ID: 200507-01
Synopsis
The PEAR XML-RPC and phpxmlrpc libraries allow remote attackers to execute arbitrary PHP script commands.
Background
The PEAR XML-RPC and phpxmlrpc libraries are both PHP implementations of the XML-RPC protocol.
Affected Packages
Package: dev-php/PEAR-XML_RPC
Vulnerable: < 1.3.1
Unaffected: >= 1.3.1
Architectures: All supported architectures
Package: dev-php/phpxmlrpc
Vulnerable: < 1.1.1
Unaffected: >= 1.1.1
Architectures: All supported architectures
Description
James Bercegay of GulfTech Security Research discovered that the PEAR XML-RPC and phpxmlrpc libraries fail to sanatize input sent using the "POST" method.
Impact
A remote attacker could exploit this vulnerability to execute arbitrary PHP script code by sending a specially crafted XML document to web applications making use of these libraries.
Workaround
There are no known workarounds at this time.
Resolution
All PEAR-XML_RPC users should upgrade to the latest available version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-php/PEAR-XML_RPC-1.3.1" | All phpxmlrpc users should upgrade to the latest available version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-php/phpxmlrpc-1.1.1" |
References
CAN-2005-1921
GulfTech Advisory
Last edited by GLSA on Sun May 07, 2006 4:57 pm; edited 1 time in total |
|