Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2005-07-05 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2005-1921
Mitre link : CVE-2005-1921
CVE.ORG link : CVE-2005-1921
JSON object : View
Products Affected
debian
- debian_linux
tiki
- tikiwiki_cms\/groupware
php
- xml_rpc
gggeek
- phpxmlrpc
drupal
- drupal
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')