XML-RPC for PHP is affected by a remote code-injection vulnerability. An attacker may exploit this issue to execute arbitrary commands or code in the context of the webserver. This may facilitate various attacks, including unauthorized remote access. XML-RPC for PHP 1.1 and prior versions are affected by this issue. Other applications using this library are also affected.
Block external access at the network boundary, unless external parties require service.
Restrict access to the affected service at the network perimeter. Permit access for trusted computers and networks only.
Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy a network intrusion detection sensor between the network perimeter and the affected service. Flag on all requests that appear to be anomalous. Audit logs regularly for indications of potential attacks.
Run all software as a nonprivileged user with minimal access rights.
Run server applications with the minimal amount of privileges required for functionality. This can reduce the impact of latent vulnerabilities.
Please see the referenced advisories for more information.