blob: 3440351e4d66480aab9de740016a22beaa75035d [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200508-14">
<title>TikiWiki, eGroupWare: Arbitrary command execution through XML-RPC</title>
TikiWiki and eGroupWare both include PHP XML-RPC code vulnerable to
arbitrary command execution.
<product type="ebuild">tikiwiki egroupware</product>
<announced>August 24, 2005</announced>
<revised>August 24, 2005: 01</revised>
<package name="www-apps/tikiwiki" auto="yes" arch="*">
<unaffected range="ge">1.8.5-r2</unaffected>
<vulnerable range="lt">1.8.5-r2</vulnerable>
<package name="www-apps/egroupware" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
TikiWiki is a full featured Free Software Wiki, CMS and Groupware
written in PHP. eGroupWare is a web-based collaboration software suite.
Both TikiWiki and eGroupWare include a PHP library to handle XML-RPC
The XML-RPC library shipped in TikiWiki and eGroupWare improperly
handles XML-RPC requests and responses with malformed nested tags.
<impact type="high">
A remote attacker could exploit this vulnerability to inject
arbitrary PHP script code into eval() statements by sending a specially
crafted XML document to TikiWiki or eGroupWare.
There is no known workaround at this time.
All TikiWiki users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.8.5-r2&quot;</code>
All eGroupWare users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-apps/egroupware-;</code>
<uri link="">CAN-2005-2498</uri>
<metadata tag="requester" timestamp="Mon, 22 Aug 2005 20:59:23 +0000">
<metadata tag="submitter" timestamp="Tue, 23 Aug 2005 23:39:36 +0000">
<metadata tag="bugReady" timestamp="Wed, 24 Aug 2005 19:23:08 +0000">