Joined: 12 May 2004
|Posted: Fri Aug 26, 2005 2:56 pm Post subject: [ GLSA 200508-18 ] PhpWiki: Arbitrary command execution thro
|Gentoo Linux Security Advisory
Title: PhpWiki: Arbitrary command execution through XML-RPC (GLSA 200508-18)
Date: August 26, 2005
PhpWiki includes PHP XML-RPC code which is vulnerable to arbitrary command execution.
PhpWiki is an application that creates a web site where anyone can edit the pages through HTML forms.
Vulnerable: < 1.3.10-r2
Unaffected: >= 1.3.10-r2
Architectures: All supported architectures
Earlier versions of PhpWiki contain an XML-RPC library that improperly handles XML-RPC requests and responses with malformed nested tags.
A remote attacker could exploit this vulnerability to inject arbitrary PHP script code into eval() statements by sending a specially crafted XML document to PhpWiki.
There is no known workaround at this time.
All PhpWiki users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/phpwiki-1.3.10-r2"
Last edited by GLSA on Sun May 07, 2006 4:58 pm; edited 1 time in total