5
CVSSv2

CVE-2005-2498

Published: 15/08/2005 Updated: 14/02/2024
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Eval injection vulnerability in PHPXMLRPC 1.1.1 and previous versions (PEAR XML-RPC for PHP), as used in multiple products including (1) Drupal, (2) phpAdsNew, (3) phpPgAds, and (4) phpgroupware, allows remote malicious users to execute arbitrary PHP code via certain nested XML tags in a PHP document that should not be nested, which are injected into an eval function call, a different vulnerability than CVE-2005-1921.

Vulnerable Product Search on Vulmon Subscribe to Product

gggeek phpxmlrpc

debian debian linux 3.1

Vendor Advisories

Synopsis php security update Type/Severity Security Advisory: Important Topic Updated PHP packages that fix a security issue are now availableThis update has been rated as having important security impact by the RedHat Security Response Team Description PHP is an HTML-embedded scripting l ...
Stefan Esser of the Hardened-PHP Project reported a serious vulnerability in the third-party XML-RPC library included with some Drupal versions An attacker could execute arbitrary PHP code on a target site This update pulls in the latest XML-RPC version from upstream The old stable distribution (woody) is not affected by this problem since no dr ...
Several vulnerabilities have been discovered in phpgroupware, a web based groupware system written in PHP The Common Vulnerabilities and Exposures project identifies the following problems: CAN-2005-2498 Stefan Esser discovered another vulnerability in the XML-RPC libraries that allows injection of arbitrary PHP code into eval() state ...

References

CWE-94http://www.hardened-php.net/advisory_152005.67.htmlhttp://www.redhat.com/support/errata/RHSA-2005-748.htmlhttp://www.debian.org/security/2005/dsa-798http://www.debian.org/security/2005/dsa-789http://www.gentoo.org/security/en/glsa/glsa-200509-19.xmlhttp://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.htmlhttp://secunia.com/advisories/16431http://secunia.com/advisories/16432http://secunia.com/advisories/16441http://secunia.com/advisories/16460http://secunia.com/advisories/16465http://secunia.com/advisories/16468http://secunia.com/advisories/16469http://secunia.com/advisories/16491http://secunia.com/advisories/16550http://secunia.com/advisories/16558http://secunia.com/advisories/16563http://secunia.com/advisories/16619http://secunia.com/advisories/16635http://secunia.com/advisories/16693http://secunia.com/advisories/16976http://secunia.com/advisories/17440http://www.debian.org/security/2005/dsa-840http://www.debian.org/security/2005/dsa-842http://secunia.com/advisories/17053http://secunia.com/advisories/17066http://www.securityfocus.com/archive/1/408125http://www.securityfocus.com/bid/14560http://www.novell.com/linux/security/advisories/2005_49_php.htmlhttp://marc.info/?l=bugtraq&m=112412415822890&w=2http://marc.info/?l=bugtraq&m=112431497300344&w=2http://marc.info/?l=bugtraq&m=112605112027335&w=2https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9569https://access.redhat.com/errata/RHSA-2005:748https://usn.ubuntu.com/171-1/https://nvd.nist.gov