First published: Fri Jul 01 2005(Updated: )
Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pear Xml Rpc | =1.2.0 | |
Pear Xml Rpc | =1.0.2 | |
Pear Xml Rpc | =1.2.1 | |
Pear Xml Rpc | =1.0.4 | |
Pear Xml Rpc | =1.2.0rc7 | |
Pear Xml Rpc | =1.3.0rc1 | |
Pear Xml Rpc | =1.3.0rc2 | |
Pear Xml Rpc | =1.1.0 | |
Pear Xml Rpc | =1.2.0rc2 | |
Pear Xml Rpc | =1.2.2 | |
Pear Xml Rpc | =1.2.0rc3 | |
Pear Xml Rpc | =1.3.0rc3 | |
Pear Xml Rpc | =1.2.0rc4 | |
Pear Xml Rpc | =1.2.0rc1 | |
Pear Xml Rpc | =1.2.0rc6 | |
Pear Xml Rpc | =1.2.0rc5 | |
Pear Xml Rpc | =1.0.3 | |
PHP XML RPC PEAR | <=1.3.0 | |
gggeek PHPXMLRPC | <=1.1 | |
Drupal | <4.5.4 | |
Drupal | >=4.6.0<4.6.2 | |
Tiki TikiWiki cms\/groupware | <1.8.5 | |
Debian | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1921 has a medium severity rating, indicating a moderate risk.
To fix CVE-2005-1921, upgrade PEAR XML_RPC to version 1.3.1 or later.
CVE-2005-1921 affects software such as WordPress, Drupal, and TikiWiki that utilize PEAR XML_RPC version 1.3.0 and earlier.
CVE-2005-1921 is classified as an eval injection vulnerability.
Yes, a patch is available by upgrading to PEAR XML_RPC version 1.3.1 or above.