7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.959 High
EPSS
Percentile
99.4%
The PEAR XML-RPC and phpxmlrpc libraries are both PHP implementations of the XML-RPC protocol.
James Bercegay of GulfTech Security Research discovered that the PEAR XML-RPC and phpxmlrpc libraries fail to sanatize input sent using the “POST” method.
A remote attacker could exploit this vulnerability to execute arbitrary PHP script code by sending a specially crafted XML document to web applications making use of these libraries.
There are no known workarounds at this time.
All PEAR-XML_RPC users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-php/PEAR-XML_RPC-1.3.1"
All phpxmlrpc users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-php/phpxmlrpc-1.1.1"
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Gentoo | any | all | dev-php/pear-xml_rpc | < 1.3.1 | UNKNOWN |
Gentoo | any | all | dev-php/phpxmlrpc | < 1.1.1 | UNKNOWN |