CVE-2005-1921

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.
References
Link Resource
http://marc.info/?l=bugtraq&m=112008638320145&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=112015336720867&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=112605112027335&w=2 Third Party Advisory
http://pear.php.net/package/XML_RPC/download/1.3.1 Patch Product
http://secunia.com/advisories/15810 Broken Link
http://secunia.com/advisories/15852 Broken Link
http://secunia.com/advisories/15855 Broken Link
http://secunia.com/advisories/15861 Broken Link
http://secunia.com/advisories/15872 Broken Link
http://secunia.com/advisories/15883 Broken Link
http://secunia.com/advisories/15884 Broken Link
http://secunia.com/advisories/15895 Broken Link
http://secunia.com/advisories/15903 Broken Link
http://secunia.com/advisories/15904 Broken Link
http://secunia.com/advisories/15916 Broken Link
http://secunia.com/advisories/15917 Broken Link
http://secunia.com/advisories/15922 Broken Link
http://secunia.com/advisories/15944 Broken Link
http://secunia.com/advisories/15947 Broken Link
http://secunia.com/advisories/15957 Broken Link
http://secunia.com/advisories/16001 Broken Link
http://secunia.com/advisories/16339 Broken Link
http://secunia.com/advisories/16693 Broken Link
http://secunia.com/advisories/17440 Broken Link
http://secunia.com/advisories/17674 Broken Link
http://secunia.com/advisories/18003 Broken Link
http://security.gentoo.org/glsa/glsa-200507-01.xml Third Party Advisory
http://security.gentoo.org/glsa/glsa-200507-06.xml Third Party Advisory
http://security.gentoo.org/glsa/glsa-200507-07.xml Third Party Advisory
http://securitytracker.com/id?1015336 Broken Link Third Party Advisory VDB Entry
http://sourceforge.net/project/showfiles.php?group_id=87163 Product
http://sourceforge.net/project/shownotes.php?release_id=338803 Broken Link
http://www.ampache.org/announce/3_3_1_2.php Broken Link
http://www.debian.org/security/2005/dsa-745 Mailing List Third Party Advisory
http://www.debian.org/security/2005/dsa-746 Mailing List Third Party Advisory
http://www.debian.org/security/2005/dsa-747 Mailing List Third Party Advisory
http://www.debian.org/security/2005/dsa-789 Mailing List Third Party Advisory
http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt Third Party Advisory
http://www.gulftech.org/?node=research&article_id=00087-07012005 Not Applicable Vendor Advisory
http://www.hardened-php.net/advisory-022005.php Not Applicable
http://www.mandriva.com/security/advisories?name=MDKSA-2005:109 Patch Third Party Advisory Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_18_sr.html Broken Link
http://www.novell.com/linux/security/advisories/2005_41_php_pear.html Broken Link
http://www.novell.com/linux/security/advisories/2005_49_php.html Broken Link
http://www.redhat.com/support/errata/RHSA-2005-564.html Broken Link
http://www.securityfocus.com/archive/1/419064/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/419064/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/14088 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2005/2827 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350 Broken Link
http://marc.info/?l=bugtraq&m=112008638320145&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=112015336720867&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=112605112027335&w=2 Third Party Advisory
http://pear.php.net/package/XML_RPC/download/1.3.1 Patch Product
http://secunia.com/advisories/15810 Broken Link
http://secunia.com/advisories/15852 Broken Link
http://secunia.com/advisories/15855 Broken Link
http://secunia.com/advisories/15861 Broken Link
http://secunia.com/advisories/15872 Broken Link
http://secunia.com/advisories/15883 Broken Link
http://secunia.com/advisories/15884 Broken Link
http://secunia.com/advisories/15895 Broken Link
http://secunia.com/advisories/15903 Broken Link
http://secunia.com/advisories/15904 Broken Link
http://secunia.com/advisories/15916 Broken Link
http://secunia.com/advisories/15917 Broken Link
http://secunia.com/advisories/15922 Broken Link
http://secunia.com/advisories/15944 Broken Link
http://secunia.com/advisories/15947 Broken Link
http://secunia.com/advisories/15957 Broken Link
http://secunia.com/advisories/16001 Broken Link
http://secunia.com/advisories/16339 Broken Link
http://secunia.com/advisories/16693 Broken Link
http://secunia.com/advisories/17440 Broken Link
http://secunia.com/advisories/17674 Broken Link
http://secunia.com/advisories/18003 Broken Link
http://security.gentoo.org/glsa/glsa-200507-01.xml Third Party Advisory
http://security.gentoo.org/glsa/glsa-200507-06.xml Third Party Advisory
http://security.gentoo.org/glsa/glsa-200507-07.xml Third Party Advisory
http://securitytracker.com/id?1015336 Broken Link Third Party Advisory VDB Entry
http://sourceforge.net/project/showfiles.php?group_id=87163 Product
http://sourceforge.net/project/shownotes.php?release_id=338803 Broken Link
http://www.ampache.org/announce/3_3_1_2.php Broken Link
http://www.debian.org/security/2005/dsa-745 Mailing List Third Party Advisory
http://www.debian.org/security/2005/dsa-746 Mailing List Third Party Advisory
http://www.debian.org/security/2005/dsa-747 Mailing List Third Party Advisory
http://www.debian.org/security/2005/dsa-789 Mailing List Third Party Advisory
http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt Third Party Advisory
http://www.gulftech.org/?node=research&article_id=00087-07012005 Not Applicable Vendor Advisory
http://www.hardened-php.net/advisory-022005.php Not Applicable
http://www.mandriva.com/security/advisories?name=MDKSA-2005:109 Patch Third Party Advisory Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_18_sr.html Broken Link
http://www.novell.com/linux/security/advisories/2005_41_php_pear.html Broken Link
http://www.novell.com/linux/security/advisories/2005_49_php.html Broken Link
http://www.redhat.com/support/errata/RHSA-2005-564.html Broken Link
http://www.securityfocus.com/archive/1/419064/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/419064/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/14088 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2005/2827 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350 Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:a:php:xml_rpc:*:*:*:*:*:pear:*:*

Configuration 2 (hide)

cpe:2.3:a:gggeek:phpxmlrpc:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:58

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=112008638320145&w=2 - Third Party Advisory () http://marc.info/?l=bugtraq&m=112008638320145&w=2 - Third Party Advisory
References () http://marc.info/?l=bugtraq&m=112015336720867&w=2 - Third Party Advisory () http://marc.info/?l=bugtraq&m=112015336720867&w=2 - Third Party Advisory
References () http://marc.info/?l=bugtraq&m=112605112027335&w=2 - Third Party Advisory () http://marc.info/?l=bugtraq&m=112605112027335&w=2 - Third Party Advisory
References () http://pear.php.net/package/XML_RPC/download/1.3.1 - Patch, Product () http://pear.php.net/package/XML_RPC/download/1.3.1 - Patch, Product
References () http://secunia.com/advisories/15810 - Broken Link () http://secunia.com/advisories/15810 - Broken Link
References () http://secunia.com/advisories/15852 - Broken Link () http://secunia.com/advisories/15852 - Broken Link
References () http://secunia.com/advisories/15855 - Broken Link () http://secunia.com/advisories/15855 - Broken Link
References () http://secunia.com/advisories/15861 - Broken Link () http://secunia.com/advisories/15861 - Broken Link
References () http://secunia.com/advisories/15872 - Broken Link () http://secunia.com/advisories/15872 - Broken Link
References () http://secunia.com/advisories/15883 - Broken Link () http://secunia.com/advisories/15883 - Broken Link
References () http://secunia.com/advisories/15884 - Broken Link () http://secunia.com/advisories/15884 - Broken Link
References () http://secunia.com/advisories/15895 - Broken Link () http://secunia.com/advisories/15895 - Broken Link
References () http://secunia.com/advisories/15903 - Broken Link () http://secunia.com/advisories/15903 - Broken Link
References () http://secunia.com/advisories/15904 - Broken Link () http://secunia.com/advisories/15904 - Broken Link
References () http://secunia.com/advisories/15916 - Broken Link () http://secunia.com/advisories/15916 - Broken Link
References () http://secunia.com/advisories/15917 - Broken Link () http://secunia.com/advisories/15917 - Broken Link
References () http://secunia.com/advisories/15922 - Broken Link () http://secunia.com/advisories/15922 - Broken Link
References () http://secunia.com/advisories/15944 - Broken Link () http://secunia.com/advisories/15944 - Broken Link
References () http://secunia.com/advisories/15947 - Broken Link () http://secunia.com/advisories/15947 - Broken Link
References () http://secunia.com/advisories/15957 - Broken Link () http://secunia.com/advisories/15957 - Broken Link
References () http://secunia.com/advisories/16001 - Broken Link () http://secunia.com/advisories/16001 - Broken Link
References () http://secunia.com/advisories/16339 - Broken Link () http://secunia.com/advisories/16339 - Broken Link
References () http://secunia.com/advisories/16693 - Broken Link () http://secunia.com/advisories/16693 - Broken Link
References () http://secunia.com/advisories/17440 - Broken Link () http://secunia.com/advisories/17440 - Broken Link
References () http://secunia.com/advisories/17674 - Broken Link () http://secunia.com/advisories/17674 - Broken Link
References () http://secunia.com/advisories/18003 - Broken Link () http://secunia.com/advisories/18003 - Broken Link
References () http://security.gentoo.org/glsa/glsa-200507-01.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-200507-01.xml - Third Party Advisory
References () http://security.gentoo.org/glsa/glsa-200507-06.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-200507-06.xml - Third Party Advisory
References () http://security.gentoo.org/glsa/glsa-200507-07.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-200507-07.xml - Third Party Advisory
References () http://securitytracker.com/id?1015336 - Broken Link, Third Party Advisory, VDB Entry () http://securitytracker.com/id?1015336 - Broken Link, Third Party Advisory, VDB Entry
References () http://sourceforge.net/project/showfiles.php?group_id=87163 - Product () http://sourceforge.net/project/showfiles.php?group_id=87163 - Product
References () http://sourceforge.net/project/shownotes.php?release_id=338803 - Broken Link () http://sourceforge.net/project/shownotes.php?release_id=338803 - Broken Link
References () http://www.ampache.org/announce/3_3_1_2.php - Broken Link () http://www.ampache.org/announce/3_3_1_2.php - Broken Link
References () http://www.debian.org/security/2005/dsa-745 - Mailing List, Third Party Advisory () http://www.debian.org/security/2005/dsa-745 - Mailing List, Third Party Advisory
References () http://www.debian.org/security/2005/dsa-746 - Mailing List, Third Party Advisory () http://www.debian.org/security/2005/dsa-746 - Mailing List, Third Party Advisory
References () http://www.debian.org/security/2005/dsa-747 - Mailing List, Third Party Advisory () http://www.debian.org/security/2005/dsa-747 - Mailing List, Third Party Advisory
References () http://www.debian.org/security/2005/dsa-789 - Mailing List, Third Party Advisory () http://www.debian.org/security/2005/dsa-789 - Mailing List, Third Party Advisory
References () http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt - Third Party Advisory () http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt - Third Party Advisory
References () http://www.gulftech.org/?node=research&article_id=00087-07012005 - Not Applicable, Vendor Advisory () http://www.gulftech.org/?node=research&article_id=00087-07012005 - Not Applicable, Vendor Advisory
References () http://www.hardened-php.net/advisory-022005.php - Not Applicable () http://www.hardened-php.net/advisory-022005.php - Not Applicable
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:109 - Patch, Third Party Advisory, Vendor Advisory () http://www.mandriva.com/security/advisories?name=MDKSA-2005:109 - Patch, Third Party Advisory, Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2005_18_sr.html - Broken Link () http://www.novell.com/linux/security/advisories/2005_18_sr.html - Broken Link
References () http://www.novell.com/linux/security/advisories/2005_41_php_pear.html - Broken Link () http://www.novell.com/linux/security/advisories/2005_41_php_pear.html - Broken Link
References () http://www.novell.com/linux/security/advisories/2005_49_php.html - Broken Link () http://www.novell.com/linux/security/advisories/2005_49_php.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2005-564.html - Broken Link () http://www.redhat.com/support/errata/RHSA-2005-564.html - Broken Link
References () http://www.securityfocus.com/archive/1/419064/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/419064/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/14088 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/14088 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2005/2827 - Broken Link () http://www.vupen.com/english/advisories/2005/2827 - Broken Link
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294 - Broken Link
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350 - Broken Link

14 Feb 2024, 15:41

Type Values Removed Values Added
CPE cpe:2.3:a:pear:xml_rpc:1.3.0rc2:*:*:*:*:*:*:*
cpe:2.3:a:pear:xml_rpc:1.2.0rc3:*:*:*:*:*:*:*
cpe:2.3:a:pear:xml_rpc:1.2.0rc6:*:*:*:*:*:*:*
cpe:2.3:a:pear:xml_rpc:1.2.0rc1:*:*:*:*:*:*:*
cpe:2.3:a:pear:xml_rpc:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:pear:xml_rpc:1.2.0rc4:*:*:*:*:*:*:*
cpe:2.3:a:pear:xml_rpc:1.2.0rc2:*:*:*:*:*:*:*
cpe:2.3:a:pear:xml_rpc:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:pear:xml_rpc:1.2.0rc5:*:*:*:*:*:*:*
cpe:2.3:a:pear:xml_rpc:1.2.0rc7:*:*:*:*:*:*:*
cpe:2.3:a:pear:xml_rpc:1.3.0rc1:*:*:*:*:*:*:*
cpe:2.3:a:pear:xml_rpc:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:pear:xml_rpc:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:pear:xml_rpc:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:pear:xml_rpc:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:pear:xml_rpc:1.3.0rc3:*:*:*:*:*:*:*
cpe:2.3:a:pear:xml_rpc:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:gggeek:phpxmlrpc:*:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:*
cpe:2.3:a:php:xml_rpc:*:*:*:*:*:pear:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
First Time Drupal drupal
Gggeek
Gggeek phpxmlrpc
Debian debian Linux
Php
Debian
Drupal
Php xml Rpc
Tiki tikiwiki Cms\/groupware
Tiki
CWE NVD-CWE-Other CWE-94
References (SECUNIA) http://secunia.com/advisories/15904 - (SECUNIA) http://secunia.com/advisories/15904 - Broken Link
References (SECUNIA) http://secunia.com/advisories/16693 - (SECUNIA) http://secunia.com/advisories/16693 - Broken Link
References (SECUNIA) http://secunia.com/advisories/15861 - (SECUNIA) http://secunia.com/advisories/15861 - Broken Link
References (SECUNIA) http://secunia.com/advisories/16339 - (SECUNIA) http://secunia.com/advisories/16339 - Broken Link
References (CONFIRM) http://sourceforge.net/project/showfiles.php?group_id=87163 - (CONFIRM) http://sourceforge.net/project/showfiles.php?group_id=87163 - Product
References (GENTOO) http://security.gentoo.org/glsa/glsa-200507-06.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-200507-06.xml - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/18003 - (SECUNIA) http://secunia.com/advisories/18003 - Broken Link
References (SUSE) http://www.novell.com/linux/security/advisories/2005_41_php_pear.html - (SUSE) http://www.novell.com/linux/security/advisories/2005_41_php_pear.html - Broken Link
References (MANDRAKE) http://www.mandriva.com/security/advisories?name=MDKSA-2005:109 - Patch, Vendor Advisory (MANDRAKE) http://www.mandriva.com/security/advisories?name=MDKSA-2005:109 - Patch, Third Party Advisory, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/15903 - (SECUNIA) http://secunia.com/advisories/15903 - Broken Link
References (SECUNIA) http://secunia.com/advisories/15957 - (SECUNIA) http://secunia.com/advisories/15957 - Broken Link
References (DEBIAN) http://www.debian.org/security/2005/dsa-746 - (DEBIAN) http://www.debian.org/security/2005/dsa-746 - Mailing List, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/15947 - (SECUNIA) http://secunia.com/advisories/15947 - Broken Link
References (BID) http://www.securityfocus.com/bid/14088 - (BID) http://www.securityfocus.com/bid/14088 - Broken Link, Third Party Advisory, VDB Entry
References (SUSE) http://www.novell.com/linux/security/advisories/2005_18_sr.html - (SUSE) http://www.novell.com/linux/security/advisories/2005_18_sr.html - Broken Link
References (HP) http://www.securityfocus.com/archive/1/419064/100/0/threaded - (HP) http://www.securityfocus.com/archive/1/419064/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/15944 - (SECUNIA) http://secunia.com/advisories/15944 - Broken Link
References (SECUNIA) http://secunia.com/advisories/15895 - (SECUNIA) http://secunia.com/advisories/15895 - Broken Link
References (SUSE) http://www.novell.com/linux/security/advisories/2005_49_php.html - (SUSE) http://www.novell.com/linux/security/advisories/2005_49_php.html - Broken Link
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=112015336720867&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=112015336720867&w=2 - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2005/2827 - (VUPEN) http://www.vupen.com/english/advisories/2005/2827 - Broken Link
References (SECUNIA) http://secunia.com/advisories/15916 - (SECUNIA) http://secunia.com/advisories/15916 - Broken Link
References (MISC) http://www.hardened-php.net/advisory-022005.php - Vendor Advisory (MISC) http://www.hardened-php.net/advisory-022005.php - Not Applicable
References (SECTRACK) http://securitytracker.com/id?1015336 - (SECTRACK) http://securitytracker.com/id?1015336 - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/15883 - (SECUNIA) http://secunia.com/advisories/15883 - Broken Link
References (DEBIAN) http://www.debian.org/security/2005/dsa-745 - (DEBIAN) http://www.debian.org/security/2005/dsa-745 - Mailing List, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/17674 - (SECUNIA) http://secunia.com/advisories/17674 - Broken Link
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=112008638320145&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=112008638320145&w=2 - Third Party Advisory
References (DEBIAN) http://www.debian.org/security/2005/dsa-747 - (DEBIAN) http://www.debian.org/security/2005/dsa-747 - Mailing List, Third Party Advisory
References (CONFIRM) http://sourceforge.net/project/shownotes.php?release_id=338803 - (CONFIRM) http://sourceforge.net/project/shownotes.php?release_id=338803 - Broken Link
References (SUSE) http://marc.info/?l=bugtraq&m=112605112027335&w=2 - (SUSE) http://marc.info/?l=bugtraq&m=112605112027335&w=2 - Third Party Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350 - Broken Link
References (SECUNIA) http://secunia.com/advisories/15872 - (SECUNIA) http://secunia.com/advisories/15872 - Broken Link
References (SECUNIA) http://secunia.com/advisories/15922 - (SECUNIA) http://secunia.com/advisories/15922 - Broken Link
References (GENTOO) http://security.gentoo.org/glsa/glsa-200507-01.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-200507-01.xml - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/15884 - (SECUNIA) http://secunia.com/advisories/15884 - Broken Link
References (CONFIRM) http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt - (CONFIRM) http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/15917 - (SECUNIA) http://secunia.com/advisories/15917 - Broken Link
References (SECUNIA) http://secunia.com/advisories/17440 - (SECUNIA) http://secunia.com/advisories/17440 - Broken Link
References (DEBIAN) http://www.debian.org/security/2005/dsa-789 - (DEBIAN) http://www.debian.org/security/2005/dsa-789 - Mailing List, Third Party Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294 - Broken Link
References (CONFIRM) http://www.ampache.org/announce/3_3_1_2.php - (CONFIRM) http://www.ampache.org/announce/3_3_1_2.php - Broken Link
References (MISC) http://pear.php.net/package/XML_RPC/download/1.3.1 - Patch (MISC) http://pear.php.net/package/XML_RPC/download/1.3.1 - Patch, Product
References (SECUNIA) http://secunia.com/advisories/15855 - (SECUNIA) http://secunia.com/advisories/15855 - Broken Link
References (GENTOO) http://security.gentoo.org/glsa/glsa-200507-07.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-200507-07.xml - Third Party Advisory
References (MISC) http://www.gulftech.org/?node=research&article_id=00087-07012005 - Patch, Vendor Advisory (MISC) http://www.gulftech.org/?node=research&article_id=00087-07012005 - Not Applicable, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/15810 - (SECUNIA) http://secunia.com/advisories/15810 - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2005-564.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2005-564.html - Broken Link
References (SECUNIA) http://secunia.com/advisories/15852 - (SECUNIA) http://secunia.com/advisories/15852 - Broken Link
References (SECUNIA) http://secunia.com/advisories/16001 - (SECUNIA) http://secunia.com/advisories/16001 - Broken Link

Information

Published : 2005-07-05 04:00

Updated : 2024-11-20 23:58


NVD link : CVE-2005-1921

Mitre link : CVE-2005-1921

CVE.ORG link : CVE-2005-1921


JSON object : View

Products Affected

gggeek

  • phpxmlrpc

php

  • xml_rpc

tiki

  • tikiwiki_cms\/groupware

debian

  • debian_linux

drupal

  • drupal
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')