Family: CGI abuses --> Category: attack
phpRPC Library Remote Code Execution Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Checks for remote code execution in phpRPC library
Detailed Explanation for this Vulnerability Test
The remote web server contains a PHP library that is prone to
arbitrary code execution.
The remote host has installed on it the phpRPC library, an xmlrpc
library written in PHP and bundled with applications such as RunCms
The version of phpRPC on the remote host fails to sanitize user input
to the 'server.php' script before using it in an 'eval()' function,
which may allow for remote code to be executed on the affected host
subject to the rights of the web server userid.
Note that successful exploitation may require that the phpRPC library
be enabled in, say, RunCms, which is not necessarily the default.
See also :
Disable or remove the affected library.
High / CVSS Base Score : 7.0
Click HERE for more information and discussions on this network vulnerability scan.