Korean
<< Back
VID 21882
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The phpRPC library is vulnerable to a remote code execution vulnerability via the 'server.php' script. phpRPC is an xmlrpc library written in PHP and bundled with applications such as RunCms and exoops. phpRPC version 0.9 and earlier versions could allow a remote attacker to execute arbitrary code on the system, caused by a vulnerability within the "decode()" function in the rpc_decoder.php script when decoding received XML data. By sending a specially-crafted XML request to the server.php script, a remote attacker could exploit this vulnerability to execute arbitrary code on the affected host.

* References:
http://www.gulftech.org/?node=research&article_id=00105-02262006
http://www.securityfocus.com/archive/1/426193/30/0/threaded
http://secunia.com/advisories/19028/
http://secunia.com/advisories/19058/

* Platforms Affected:
SourceForge Project, phpRPC version 0.9 and earlier versions
Any operating system Any version
Recommendation Upgrade to a latest version of phpRPC Library from the phpRPC Web site at http://sourceforge.net/projects/phprpc/
Related URL CVE-2006-1032 (CVE)
Related URL 16833 (SecurityFocus)
Related URL 24967 (ISS)