CVE-2005-1921

Scores

EPSS

0.862high86.2%
0%20%40%60%80%100%

Percentile: 86.2%

CVSS

7.5high2.0
0246810

CVSS Score: 7.5/10

All CVSS Scores

CVSS 2.0
7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Description

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhat

CWEs

CWE-94

Exploits

Exploit ID: 1078

Source: exploitdb

URL: https://www.exploit-db.com/exploits/1078

Exploit ID: 1083

Source: exploitdb

URL: https://www.exploit-db.com/exploits/1083

Exploit ID: 1084

Source: exploitdb

URL: https://www.exploit-db.com/exploits/1084

Exploit ID: 16882

Source: exploitdb

URL: https://www.exploit-db.com/exploits/16882

Exploit ID: 43829

Source: exploitdb

URL: https://www.exploit-db.com/exploits/43829

Recommendations

Source: nvd

All phpWebSite users should upgrade to the latest available
version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=www-app/phpwebsite-0.10.1-r1”

URL: http://security.gentoo.org/glsa/glsa-200507-07.xml

Source: nvd

All TikiWiki users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=www-apps/tikiwiki-1.8.5-r1”

URL: http://security.gentoo.org/glsa/glsa-200507-06.xml

Source: nvd

All PEAR-XML_RPC users should upgrade to the latest available
version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=dev-php/PEAR-XML_RPC-1.3.1”

All phpxmlrpc users should upgrade to the latest available
version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=dev-php/phpxmlrpc-1.1.1”

URL: http://security.gentoo.org/glsa/glsa-200507-01.xml

Vulnerable Software (14)

Type: Configuration

Product: drupal

Operating System: debian

Trait:
{  "fixed": "4.5.4-1"}

Source: debian

Type: Configuration

Product: egroupware

Operating System: debian

Trait:
{  "fixed": "1.0.0.007-3.dfsg-1"}

Source: debian

Type: Configuration

Product: horde3

Operating System: debian

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: php

Operating System: rhel 3

Trait:
{  "fixed": "4.3.2-24.ent"}

Source: redhat

Type: Configuration

Product: php

Operating System: rhel 4

Trait:
{  "fixed": "4.3.9-3.7"}

Source: redhat

Type: Configuration

Product: php4

Operating System: debian

Trait:
{  "fixed": "4:4.3.10-16"}

Source: debian

Type: Configuration

Product: phpgroupware

Operating System: debian

Trait:
{  "fixed": "0.9.16.006-1"}

Source: debian

Type: Configuration

Product: phpwiki

Operating System: debian

Trait:
{  "fixed": "1.3.7-4"}

Source: debian

Type: Configuration

Product: serendipity

Operating System: debian

Trait:
{  "fixed": "1.0-1"}

Source: debian

Type: Configuration

Vendor: *

Product: debian_linux

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

Type: Configuration

Vendor: *

Product: drupal

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",      "versionEndExcluding": "4.5.4",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:drupal:dr...

Source: nvd

Type: Configuration

Vendor: *

Product: phpxmlrpc

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:gggeek:phpxmlrpc:*:*:*:*:*:*:*:*",      "versionEndIncluding": "1.1",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

Type: Configuration

Vendor: *

Product: tikiwiki_cms/groupware

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:*:*:*:*:*:*:*:*",      "versionEndExcluding": "1.8.5",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

Type: Configuration

Vendor: *

Product: xml_rpc

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:php:xml_rpc:*:*:*:*:*:pear:*:*",      "versionEndIncluding": "1.3.0",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

End of list