Lucene search

K
cve[email protected]CVE-2005-1921
HistoryJul 05, 2005 - 4:00 a.m.

CVE-2005-1921

2005-07-0504:00:00
CWE-94
web.nvd.nist.gov
134
cve
eval injection
pear xml_rpc
xml-rpc
phpxmlrpc
wordpress
serendipity
drupal
egroupware
mailwatch
tikiwiki
phpwebsite
ampache

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.6 High

AI Score

Confidence

Low

0.956 High

EPSS

Percentile

99.4%

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

Affected configurations

NVD
Node
phpxml_rpcRange1.3.0pear
Node
gggeekphpxmlrpcRange1.1
Node
drupaldrupalRange<4.5.4
OR
drupaldrupalRange4.6.04.6.2
Node
tikitikiwiki_cms\/groupwareRange<1.8.5
Node
debiandebian_linuxMatch3.1
CPENameOperatorVersion
php:xml_rpcphp xml rpcle1.3.0

References

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.6 High

AI Score

Confidence

Low

0.956 High

EPSS

Percentile

99.4%