Gentoo Logo

phpWebSite: Multiple vulnerabilities

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200507-07 / phpwebsite
Release Date July 10, 2005
Latest Revision July 10, 2005: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
www-apps/phpwebsite < 0.10.1-r1 >= 0.10.1-r1 All supported architectures

Related bugreports: #97461

Synopsis

phpWebSite is vulnerable to the remote execution of arbitrary PHP script code and to other, yet undisclosed, vulnerabilities.

2.  Impact Information

Background

phpWebSite is a content management system written in PHP.

Description

phpWebSite fails to sanitize input sent to the XML-RPC server using the "POST" method. Other unspecified vulnerabilities have been discovered by Diabolic Crab of Hackers Center.

Impact

A remote attacker could exploit the XML-RPC vulnerability to execute arbitrary PHP script code by sending specially crafted XML data to phpWebSite. The undisclosed vulnerabilities do have an unknown impact.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All phpWebSite users should upgrade to the latest available version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-app/phpwebsite-0.10.1-r1"

4.  References



Print

Page updated July 10, 2005

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.