Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2005-1921 | First vendor Publication | 2005-07-05 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1921 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-35 | Leverage Executable Code in Nonexecutable Files |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11294 | |||
Oval ID: | oval:org.mitre.oval:def:11294 | ||
Title: | Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement. | ||
Description: | Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-1921 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:350 | |||
Oval ID: | oval:org.mitre.oval:def:350 | ||
Title: | PEAR XML_RPC PHP Code Execution Vulnerability | ||
Description: | Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-1921 | Version: | 1 |
Platform(s): | Red Hat Enterprise Linux 3 | Product(s): | php |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-10 | Name : SLES9: Security update for PHP4 File : nvt/sles9p5015816.nasl |
2009-10-10 | Name : SLES9: Security update for PHP4 File : nvt/sles9p5021688.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200507-01 (pear-xml_rpc phpxmlrpc) File : nvt/glsa_200507_01.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200507-02 (wordpress) File : nvt/glsa_200507_02.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200507-06 (Tikiwiki) File : nvt/glsa_200507_06.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200507-07 (phpwebsite) File : nvt/glsa_200507_07.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200507-08 (phpgroupware egroupware) File : nvt/glsa_200507_08.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200507-15 (PHP) File : nvt/glsa_200507_15.nasl |
2008-09-04 | Name : FreeBSD Ports: drupal File : nvt/freebsd_drupal.nasl |
2008-09-04 | Name : FreeBSD Ports: pear-XML_RPC File : nvt/freebsd_pear-XML_RPC.nasl |
2008-09-04 | Name : FreeBSD Ports: postnuke File : nvt/freebsd_postnuke1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 745-1 (drupal) File : nvt/deb_745_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 746-1 (phpgroupware) File : nvt/deb_746_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 747-1 (egroupware) File : nvt/deb_747_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 789-1 (php4) File : nvt/deb_789_1.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2005-192-01 PHP File : nvt/esoft_slk_ssa_2005_192_01.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
17793 | XML-RPC for PHP (PHPXMLRPC) parseRequest() Function Arbitrary PHP Code Execution XML-RPC for PHP (PHPXMLRPC) contains a flaw that may allow a remote attacker to execute arbitrary PHP code. The issue is due to the 'parseRequest()' function not properly sanitizing user-supplied input. By creating an XML file that uses single quotes to escape into the 'eval()' call, a remote attacker can execute arbitrary PHP code resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | PHP xmlrpc.php post attempt RuleID : 3827 - Revision : 16 - Type : SERVER-WEBAPP |
2015-03-31 | PHP xmlrpc.php command injection attempt RuleID : 33632 - Revision : 3 - Type : SERVER-WEBAPP |
2014-01-10 | PHP alternate xmlrpc.php command injection attempt RuleID : 13818 - Revision : 12 - Type : SERVER-WEBAPP |
2014-01-10 | PHP xmlrpc.php command injection attempt RuleID : 13817 - Revision : 12 - Type : SERVER-WEBAPP |
2014-01-10 | PHP xmlrpc.php command injection attempt RuleID : 13816 - Revision : 14 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-07-03 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2005-564.nasl - Type : ACT_GATHER_INFO |
2006-05-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_0274a9f1075911dabc080001020eed82.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-147-1.nasl - Type : ACT_GATHER_INFO |
2005-11-11 | Name : The remote web server contains a PHP script that is prone to arbitrary code e... File : phpadsnew_xmlrpc.nasl - Type : ACT_ATTACK |
2005-10-05 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2005_051.nasl - Type : ACT_GATHER_INFO |
2005-10-05 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2005_049.nasl - Type : ACT_GATHER_INFO |
2005-08-30 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-789.nasl - Type : ACT_GATHER_INFO |
2005-08-01 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_f241641ef5ea11d9a6db000d608ed240.nasl - Type : ACT_GATHER_INFO |
2005-07-20 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2005_041.nasl - Type : ACT_GATHER_INFO |
2005-07-16 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200507-15.nasl - Type : ACT_GATHER_INFO |
2005-07-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-746.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2005-192-01.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_523fad14eb9d11d9a8bd000cf18bbe54.nasl - Type : ACT_GATHER_INFO |
2005-07-11 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-747.nasl - Type : ACT_GATHER_INFO |
2005-07-11 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200507-08.nasl - Type : ACT_GATHER_INFO |
2005-07-10 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200507-07.nasl - Type : ACT_GATHER_INFO |
2005-07-10 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-745.nasl - Type : ACT_GATHER_INFO |
2005-07-08 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200507-06.nasl - Type : ACT_GATHER_INFO |
2005-07-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2005-564.nasl - Type : ACT_GATHER_INFO |
2005-07-08 | Name : The remote web server contains a PHP application that is affected by an arbit... File : drupal_xmlrpc.nasl - Type : ACT_ATTACK |
2005-07-06 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-518.nasl - Type : ACT_GATHER_INFO |
2005-07-06 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-517.nasl - Type : ACT_GATHER_INFO |
2005-07-05 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200507-02.nasl - Type : ACT_GATHER_INFO |
2005-07-05 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200507-01.nasl - Type : ACT_GATHER_INFO |
2005-07-01 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2005-109.nasl - Type : ACT_GATHER_INFO |
2005-07-01 | Name : The remote web server contains a PHP script that is prone to a remote code in... File : serendipity_xmlrpc_code_injection.nasl - Type : ACT_ATTACK |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:22:03 |
|
2024-11-28 12:07:10 |
|
2024-02-14 21:28:25 |
|
2021-05-04 12:03:01 |
|
2021-04-22 01:03:16 |
|
2020-05-23 13:16:46 |
|
2020-05-23 00:16:38 |
|
2019-03-18 12:01:04 |
|
2018-10-19 21:19:37 |
|
2017-10-11 09:23:31 |
|
2016-10-18 12:01:42 |
|
2016-04-26 13:36:14 |
|
2015-03-31 21:26:17 |
|
2014-02-17 10:31:45 |
|
2014-01-19 21:22:46 |
|
2013-05-11 11:27:19 |
|