TikiWiki: Arbitrary command execution through XML-RPC — GLSA 200507-06

TikiWiki includes PHP XML-RPC code, making it vulnerable to arbitrary command execution.

Affected packages

www-apps/tikiwiki on all architectures
Affected versions < 1.8.5-r1
Unaffected versions >= 1.8.5-r1

Background

TikiWiki is a web-based groupware and content management system (CMS), using PHP, ADOdb and Smarty. TikiWiki includes vulnerable PHP XML-RPC code.

Description

TikiWiki is vulnerable to arbitrary command execution as described in GLSA 200507-01.

Impact

A remote attacker could exploit this vulnerability to execute arbitrary PHP code by sending specially crafted XML data.

Workaround

There is no known workaround at this time.

Resolution

All TikiWiki users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.5-r1"

References

Release date
July 06, 2005

Latest revision
July 06, 2005: 01

Severity
high

Exploitable
remote

Bugzilla entries