7.5
CVSSv2

CVE-2005-1921

Published: 05/07/2005 Updated: 14/02/2024
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 775
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and previous versions (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and previous versions, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote malicious users to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

Vulnerable Product Search on Vulmon Subscribe to Product

php xml rpc

gggeek phpxmlrpc

drupal drupal

tiki tikiwiki cms\\/groupware

debian debian linux 3.1

Vendor Advisories

Synopsis php security update Type/Severity Security Advisory: Important Topic Updated PHP packages that fix two security issues are now availableThis update has been rated as having important security impact by the RedHat Security Response Team Description PHP is an HTML-embedded scriptin ...
A remote code execution vulnerability has been discovered in the XMLRPC module of the PEAR (PHP Extension and Application Repository) extension of PHP By sending specially crafted XMLRPC requests to an affected web server, a remote attacker could exploit this to execute arbitrary code with the web server’s privileges ...
A vulnerability has been identified in the xmlrpc library included in the egroupware package This vulnerability could lead to the execution of arbitrary commands on the server running egroupware The old stable distribution (woody) did not include egroupware For the current stable distribution (sarge), this problem is fixed in version 100007-2 ...
Two input validation errors were discovered in drupal and its bundled xmlrpc module These errors can lead to the execution of arbitrary commands on the web server running drupal drupal was not included in the old stable distribution (woody) For the current stable distribution (sarge), these problems have been fixed in version 453-3 For the u ...

Exploits

## # $Id: php_xmlrpc_evalrb 9929 2010-07-25 21:37:54Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class ...
# tested and working /str0ke #!/usr/bin/perl # # ilo-- # # This program is no GPL or has nothing to do with FSF, but some # code was ripped from romansoft sorry, too lazy! # # xmlrpc bug by James from GulfTech Security Research # pearphpnet/bugs/bugphp?id=4692 # xmlrpc drupal exploit, but James sais xoops, phpnuke and other ...
#-------------------------------------------------------# # /| # # | | # # | | # # /\ ________| |___ # # / \ \_______ __/ ...
PHPXMLRPC Remote Code Execution Vendor: Useful Information Inc Product: PHPXMLRPC Version: <= 11 Website: phpxmlrpcsourceforgenet/ BID: 14088 CVE: CVE-2005-1921 OSVDB: 17793 SECUNIA: 15852 PACKETSTORM: 38394 Description: PHPXMLRPC aka XML-RPC For PHP is a PHP implementation of the XML-RPC web RPC protocol, and was originally d ...
#!/usr/bin/perl -w # ******************************************************** # XML-RPC Remote Command Execution Exploit By Mike Rifone # ******************************************************** # This works on da phpxmlrpc, and da PEAR XML_RPC too! All # you need is to put the url to the server and u get shell # Dis is my first exploit but hey it ...

References

CWE-94http://pear.php.net/package/XML_RPC/download/1.3.1http://www.gulftech.org/?node=research&article_id=00087-07012005http://www.hardened-php.net/advisory-022005.phphttp://www.mandriva.com/security/advisories?name=MDKSA-2005:109http://sourceforge.net/project/shownotes.php?release_id=338803http://www.debian.org/security/2005/dsa-745http://www.debian.org/security/2005/dsa-747http://security.gentoo.org/glsa/glsa-200507-01.xmlhttp://security.gentoo.org/glsa/glsa-200507-06.xmlhttp://security.gentoo.org/glsa/glsa-200507-07.xmlhttp://www.drupal.org/security/drupal-sa-2005-003/advisory.txthttp://sourceforge.net/project/showfiles.php?group_id=87163http://www.ampache.org/announce/3_3_1_2.phphttp://secunia.com/advisories/15852http://secunia.com/advisories/15872http://secunia.com/advisories/15944http://secunia.com/advisories/15947http://secunia.com/advisories/15957http://secunia.com/advisories/16001http://www.debian.org/security/2005/dsa-789http://www.securityfocus.com/bid/14088http://securitytracker.com/id?1015336http://secunia.com/advisories/18003http://secunia.com/advisories/15810http://secunia.com/advisories/15855http://secunia.com/advisories/15861http://secunia.com/advisories/15883http://secunia.com/advisories/15884http://secunia.com/advisories/15895http://secunia.com/advisories/15903http://secunia.com/advisories/15904http://secunia.com/advisories/15916http://secunia.com/advisories/15917http://secunia.com/advisories/15922http://secunia.com/advisories/16339http://secunia.com/advisories/16693http://secunia.com/advisories/17440http://secunia.com/advisories/17674http://www.debian.org/security/2005/dsa-746http://www.redhat.com/support/errata/RHSA-2005-564.htmlhttp://www.novell.com/linux/security/advisories/2005_41_php_pear.htmlhttp://www.novell.com/linux/security/advisories/2005_49_php.htmlhttp://www.novell.com/linux/security/advisories/2005_18_sr.htmlhttp://www.vupen.com/english/advisories/2005/2827http://marc.info/?l=bugtraq&m=112008638320145&w=2http://marc.info/?l=bugtraq&m=112015336720867&w=2http://marc.info/?l=bugtraq&m=112605112027335&w=2https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294http://www.securityfocus.com/archive/1/419064/100/0/threadedhttps://access.redhat.com/errata/RHSA-2005:564https://usn.ubuntu.com/147-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/16882/https://www.kb.cert.org/vuls/id/442845