|
Family: CGI abuses --> Category: attack
phpRPC Library Remote Code Execution Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for remote code execution in phpRPC library
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP library that is prone to
arbitrary code execution.
Description :
The remote host has installed on it the phpRPC library, an xmlrpc
library written in PHP and bundled with applications such as RunCms
and exoops.
The version of phpRPC on the remote host fails to sanitize user input
to the 'server.php' script before using it in an 'eval()' function,
which may allow for remote code to be executed on the affected host
subject to the rights of the web server userid.
Note that successful exploitation may require that the phpRPC library
be enabled in, say, RunCms, which is not necessarily the default.
See also :
http://www.gulftech.org/?node=research&article_id=00105-02262006
http://www.securityfocus.com/archive/1/426193/30/0/threaded
Solution :
Disable or remove the affected library.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|