blob: d8117247c8f953e73af7ede6541d968e3ff11835 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200507-07">
<title>phpWebSite: Multiple vulnerabilities</title>
phpWebSite is vulnerable to the remote execution of arbitrary PHP script
code and to other, yet undisclosed, vulnerabilities.
<product type="ebuild">phpwebsite</product>
<announced>July 10, 2005</announced>
<revised>July 10, 2005: 01</revised>
<package name="www-apps/phpwebsite" auto="yes" arch="*">
<unaffected range="ge">0.10.1-r1</unaffected>
<vulnerable range="lt">0.10.1-r1</vulnerable>
phpWebSite is a content management system written in PHP.
phpWebSite fails to sanitize input sent to the XML-RPC server
using the "POST" method. Other unspecified vulnerabilities have been
discovered by Diabolic Crab of Hackers Center.
<impact type="high">
A remote attacker could exploit the XML-RPC vulnerability to
execute arbitrary PHP script code by sending specially crafted XML data
to phpWebSite. The undisclosed vulnerabilities do have an unknown
There is no known workaround at this time.
All phpWebSite users should upgrade to the latest available
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-app/phpwebsite-0.10.1-r1&quot;</code>
<uri link="">CAN-2005-1921</uri>
<uri link=";ANN_user_op=view&amp;ANN_id=989">phpWebSite announcement</uri>
<metadata tag="requester" timestamp="Wed, 06 Jul 2005 12:51:16 +0000">
<metadata tag="submitter" timestamp="Wed, 06 Jul 2005 14:39:13 +0000">
<metadata tag="bugReady" timestamp="Sat, 09 Jul 2005 22:50:54 +0000">