Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200508-21] phpWebSite: Arbitrary command execution through XML-RPC and SQL injection Vulnerability Scan
Vulnerability Scan Summary
phpWebSite: Arbitrary command execution through XML-RPC and SQL injection
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200508-21
(phpWebSite: Arbitrary command execution through XML-RPC and SQL injection)
phpWebSite uses an XML-RPC library that improperly handles XML-RPC
requests and responses with malformed nested tags. Furthermore,
"matrix_killer" reported that phpWebSite is vulnerable to an SQL
A malicious remote user could exploit this vulnerability to inject
arbitrary PHP script code into eval() statements by sending a specially
crafted XML document, and also inject SQL commands to access the
underlying database directly.
There is no known workaround at this time.
All phpWebSite users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/phpwebsite-0.10.2_rc2"
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.