Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> CGI abuses >> phpRPC Library Remote Code Execution Vulnerability

Vulnerability Assessment Details

phpRPC Library Remote Code Execution Vulnerability

Vulnerability Assessment Summary
Checks for remote code execution in phpRPC library

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a PHP library that is prone to
arbitrary code execution.

Description :

The remote host has installed on it the phpRPC library, an xmlrpc
library written in PHP and bundled with applications such as RunCms
and exoops.

The version of phpRPC on the remote host fails to sanitize user input
to the 'server.php' script before using it in an 'eval()' function,
which may permit for remote code to be executed on the affected host
subject to the rights of the web server userid.

Note that successful exploitation may require that the phpRPC library
be enabled in, say, RunCms, which is not necessarily the default.

See also :

Solution :

Disable or remove the affected library.

Network Security Threat Level:

High / CVSS Base Score : 7.0

Networks Security ID: 16833

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Axiom Memory Solutions SCSCSD9Y-25M-AX
Axiom Memory Solutions SCSCSD9Y-25M-AX pictureAxiom Memory Solutions SCSCMD6O-8M-AX
Axiom Memory Solutions SCSCMD6O-8M-AX pictureAxiom Memory Solutions SCSCMD6O-6M-AX
Axiom Memory Solutions SCSCMD6O-6M-AX pictureAxiom Memory Solutions SCSCMD6O-4M-AX
Axiom Memory Solutions SCSCMD6O-4M-AX picture


No Discussions have been posted on this vulnerability.