📄 13818.txt
字号:
Rule--Sid13818--Summary:This event is generated when an attempt is made to exploit a known vulnerability in XML_RPC.--Impact:Denial of Service. Information disclosure. Loss of integrity. Complete admin access.--Detailed Information:Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.--Affected Systems:PEAR XML_RPC 1.3.0RC3PEAR XML_RPC 1.3.0RC2PEAR XML_RPC 1.3.0RC1PEAR XML_RPC 1.2.2PEAR XML_RPC 1.2.1PEAR XML_RPC 1.2.0PEAR XML_RPC 1.2.0RC7PEAR XML_RPC 1.2.0RC6PEAR XML_RPC 1.2.0RC5PEAR XML_RPC 1.2.0RC4PEAR XML_RPC 1.2.0RC3PEAR XML_RPC 1.2.0RC2PEAR XML_RPC 1.2.0RC1PEAR XML_RPC 1.1.0PEAR XML_RPC 1.0.4PEAR XML_RPC 1.0.3PEAR XML_RPC 1.0.2--Attack Scenarios:--Ease of Attack:--False Positives:None known.--False Negatives:None known.--Corrective Action:Upgrade to the latest non-affected version of the software.Apply the appropriate vendor supplied patches.--Contributors:Sourcefire Vulnerability Research TeamThis document was generated from data supplied by the National Vulnerability Database. A product of the National Institute of Standards and Technology.For more information see http://nvd.nist.gov/--Additional References:NIST CVE-2005-1921:http://nvd.nist.gov/nvd.cfm?cvename=CVE-2005-1921--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -