SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   XML-RPC for PHP Vendors:   phpxmlrpc.sourceforge.net
XML-RPC for PHP Lets Remote Users Execute Arbitrary PHP Code
SecurityTracker Alert ID:  1014327
SecurityTracker URL:  http://securitytracker.com/id/1014327
CVE Reference:   CVE-2005-1921   (Links to External Site)
Updated:  Jul 4 2005
Original Entry Date:  Jun 29 2005
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 1.1 and possibly prior versions
Description:   A vulnerability was reported in XML-RPC for PHP. A remote user can execute arbitrary PHP code on the target system.

PHPXMLRPC is vulnerable to a very high risk remote php code execution vulnerability that may allow for an attacker to compromise a vulnerable webserver. The vulnerability is the result of unsanatized data being passed directly into an eval() call in

The parseRequest() function does not properly validate user-supplied input before making an eval() call. A remote user can create a specially crafted XML file and submit the file in an HTTP POST request to execute arbitrary PHP code on the target system.

A demonstration exploit is provided:

<?xml version="1.0"?>
<methodCall>
<methodName>test.method</methodName>
<params>
<param>
<value><name>','')); phpinfo(); exit;/*</name></value>
</param>
</params>
</methodCall>

PEAR XML_RPC is also affected.

The vendor was notified on June 26, 2005.

James from GulfTech Security Research discovered this vulnerability.

Impact:   A remote user can execute arbitrary PHP code on the target system with the privileges of the target web service.
Solution:   The vendor has issued a fixed version (1.1.1), available at:

http://sourceforge.net/project/showfiles.php?group_id=34455&package_id=26601

Vendor URL:  phpxmlrpc.sourceforge.net/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 1 2005 (PostNuke Issues Advisory) XML-RPC for PHP Lets Remote Users Execute Arbitrary PHP Code
PostNuke is affected and has issued a security advisory.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC