Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2005-07-05 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2005-1921
Mitre link : CVE-2005-1921
CVE.ORG link : CVE-2005-1921
JSON object : View
Products Affected
tiki
- tikiwiki_cms\/groupware
gggeek
- phpxmlrpc
debian
- debian_linux
php
- xml_rpc
drupal
- drupal
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')