First published: Mon Aug 15 2005(Updated: )
Eval injection vulnerability in PHPXMLRPC 1.1.1 and earlier (PEAR XML-RPC for PHP), as used in multiple products including (1) Drupal, (2) phpAdsNew, (3) phpPgAds, and (4) phpgroupware, allows remote attackers to execute arbitrary PHP code via certain nested XML tags in a PHP document that should not be nested, which are injected into an eval function call, a different vulnerability than CVE-2005-1921.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP XML-RPC | =1.1.1 | |
PHP XML RPC | <=1.1.1 | |
Debian Linux | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2498 is considered a critical vulnerability due to the potential for remote code execution in affected applications.
To fix CVE-2005-2498, upgrade PHPXMLRPC to version 1.1.2 or later, or apply relevant security patches provided by your software vendor.
CVE-2005-2498 affects multiple products including Drupal, phpAdsNew, phpPgAds, and phpgroupware that utilize vulnerable versions of PHPXMLRPC.
Yes, CVE-2005-2498 can be exploited remotely, allowing attackers to execute arbitrary PHP code on the server.
Exploitation of CVE-2005-2498 can lead to unauthorized access, data theft, or a complete compromise of the affected system.