Gentoo Logo

phpWebSite: Multiple vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200507-07 / phpwebsite
Release Date July 10, 2005
Latest Revision July 10, 2005: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
www-apps/phpwebsite < 0.10.1-r1 >= 0.10.1-r1 All supported architectures

Related bugreports: #97461


phpWebSite is vulnerable to the remote execution of arbitrary PHP script code and to other, yet undisclosed, vulnerabilities.

2.  Impact Information


phpWebSite is a content management system written in PHP.


phpWebSite fails to sanitize input sent to the XML-RPC server using the "POST" method. Other unspecified vulnerabilities have been discovered by Diabolic Crab of Hackers Center.


A remote attacker could exploit the XML-RPC vulnerability to execute arbitrary PHP script code by sending specially crafted XML data to phpWebSite. The undisclosed vulnerabilities do have an unknown impact.

3.  Resolution Information


There is no known workaround at this time.


All phpWebSite users should upgrade to the latest available version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-app/phpwebsite-0.10.1-r1"

4.  References


Page updated July 10, 2005

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.