CVE-2005-1921

NameCVE-2005-1921
DescriptionEval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-745-1, DSA-746-1, DSA-747-1, DSA-789-1, DTSA-15-1
Debian Bugs316362, 316447, 316714, 317263

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
drupalsourcesarge4.5.3-3highDSA-745-1
drupalsource(unstable)4.5.4-1high316362
egroupwaresourcesarge1.0.0.007-2.dfsg-2sarge1highDSA-747-1
egroupwaresource(unstable)1.0.0.007-3.dfsg-1high317263
horde3source(unstable)(not affected)
php4sourcewoody4:4.1.2-7.woody5highDSA-789-1
php4sourcesarge4:4.3.10-16highDSA-789-1
php4sourceetch4:4.3.10-16etch1DTSA-15-1
php4source(unstable)4:4.3.10-16high316447
phpgroupwaresourcewoody(unfixed)highDSA-746-1
phpgroupwaresourcesarge0.9.16.005-3.sarge0highDSA-746-1
phpgroupwaresource(unstable)0.9.16.006-1high
phpwikisource(unstable)1.3.7-4high316714
serendipitysource(unstable)1.0-1

Notes

- horde3 <not-affected> (horde3 ships different XMLRPC code)

Search for package or bug name: Reporting problems