Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

phpRPC Library Remote Code Execution Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Checks for remote code execution in phpRPC library

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP library that is prone to
arbitrary code execution.

Description :

The remote host has installed on it the phpRPC library, an xmlrpc
library written in PHP and bundled with applications such as RunCms
and exoops.

The version of phpRPC on the remote host fails to sanitize user input
to the 'server.php' script before using it in an 'eval()' function,
which may allow for remote code to be executed on the affected host
subject to the rights of the web server userid.

Note that successful exploitation may require that the phpRPC library
be enabled in, say, RunCms, which is not necessarily the default.

See also :

http://www.gulftech.org/?node=research&article_id=00105-02262006
http://www.securityfocus.com/archive/1/426193/30/0/threaded

Solution :

Disable or remove the affected library.

Threat Level:

High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.