GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Fri Aug 26, 2005 2:56 pm Post subject: [ GLSA 200508-18 ] PhpWiki: Arbitrary command execution thro |
|
|
Gentoo Linux Security Advisory
Title: PhpWiki: Arbitrary command execution through XML-RPC (GLSA 200508-18)
Severity: high
Exploitable: remote
Date: August 26, 2005
Bug(s): #102380
ID: 200508-18
Synopsis
PhpWiki includes PHP XML-RPC code which is vulnerable to arbitrary command execution.
Background
PhpWiki is an application that creates a web site where anyone can edit the pages through HTML forms.
Affected Packages
Package: www-apps/phpwiki
Vulnerable: < 1.3.10-r2
Unaffected: >= 1.3.10-r2
Architectures: All supported architectures
Description
Earlier versions of PhpWiki contain an XML-RPC library that improperly handles XML-RPC requests and responses with malformed nested tags.
Impact
A remote attacker could exploit this vulnerability to inject arbitrary PHP script code into eval() statements by sending a specially crafted XML document to PhpWiki.
Workaround
There is no known workaround at this time.
Resolution
All PhpWiki users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/phpwiki-1.3.10-r2" |
References
CAN-2005-2498
Last edited by GLSA on Sun May 07, 2006 4:58 pm; edited 1 time in total |
|