Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2005-1921

Опубликовано: 05 июл. 2005
Источник: nvd
CVSS2: 7.5
EPSS Высокий

Описание

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:php:xml_rpc:*:*:*:*:*:pear:*:*
Версия до 1.3.0 (включая)
Конфигурация 2
cpe:2.3:a:gggeek:phpxmlrpc:*:*:*:*:*:*:*:*
Версия до 1.1 (включая)
Конфигурация 3

Одно из

cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
Версия до 4.5.4 (исключая)
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
Версия от 4.6.0 (включая) до 4.6.2 (исключая)
Конфигурация 4
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:*
Версия до 1.8.5 (исключая)
Конфигурация 5
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*

EPSS

Процентиль: 99%
0.86898
Высокий

7.5 High

CVSS2

Дефекты

CWE-94

Связанные уязвимости

ubuntu
почти 20 лет назад

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

redhat
почти 20 лет назад

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

debian
почти 20 лет назад

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XM ...

github
около 3 лет назад

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

EPSS

Процентиль: 99%
0.86898
Высокий

7.5 High

CVSS2

Дефекты

CWE-94