CVE-2005-1921

N/A Unknown
Published: July 05, 2005 Modified: April 16, 2026
View on NVD

Description

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=112008638320145&w=2
Source: secalert@redhat.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=112015336720867&w=2
Source: secalert@redhat.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=112605112027335&w=2
Source: secalert@redhat.com
Third Party Advisory
http://pear.php.net/package/XML_RPC/download/1.3.1
Source: secalert@redhat.com
Patch Product
http://secunia.com/advisories/15810
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/15852
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/15855
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/15861
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/15872
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/15883
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/15884
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/15895
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/15903
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/15904
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/15916
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/15917
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/15922
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/15944
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/15947
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/15957
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/16001
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/16339
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/16693
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/17440
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/17674
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/18003
Source: secalert@redhat.com
Broken Link
http://security.gentoo.org/glsa/glsa-200507-01.xml
Source: secalert@redhat.com
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200507-06.xml
Source: secalert@redhat.com
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200507-07.xml
Source: secalert@redhat.com
Third Party Advisory
http://securitytracker.com/id?1015336
Source: secalert@redhat.com
Broken Link Third Party Advisory VDB Entry
http://www.ampache.org/announce/3_3_1_2.php
Source: secalert@redhat.com
Broken Link
http://www.debian.org/security/2005/dsa-745
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://www.debian.org/security/2005/dsa-746
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://www.debian.org/security/2005/dsa-747
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://www.debian.org/security/2005/dsa-789
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt
Source: secalert@redhat.com
Third Party Advisory
http://www.gulftech.org/?node=research&article_id=00087-07012005
Source: secalert@redhat.com
Not Applicable Vendor Advisory
http://www.hardened-php.net/advisory-022005.php
Source: secalert@redhat.com
Not Applicable
http://www.mandriva.com/security/advisories?name=MDKSA-2005:109
Source: secalert@redhat.com
Patch Third Party Advisory Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-564.html
Source: secalert@redhat.com
Broken Link
http://www.securityfocus.com/archive/1/419064/100/0/threaded
Source: secalert@redhat.com
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/14088
Source: secalert@redhat.com
Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2005/2827
Source: secalert@redhat.com
Broken Link
http://marc.info/?l=bugtraq&m=112008638320145&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=112015336720867&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=112605112027335&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://pear.php.net/package/XML_RPC/download/1.3.1
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Product
http://secunia.com/advisories/15810
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15852
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15855
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15861
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15872
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15883
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15884
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15895
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15903
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15904
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15916
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15917
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15922
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15944
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15947
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/15957
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/16001
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/16339
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/16693
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/17440
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/17674
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/18003
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://security.gentoo.org/glsa/glsa-200507-01.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200507-06.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200507-07.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1015336
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://sourceforge.net/project/showfiles.php?group_id=87163
Source: af854a3a-2127-422b-91ae-364da2661108
Product
http://sourceforge.net/project/shownotes.php?release_id=338803
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.ampache.org/announce/3_3_1_2.php
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.debian.org/security/2005/dsa-745
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.debian.org/security/2005/dsa-746
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.debian.org/security/2005/dsa-747
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.debian.org/security/2005/dsa-789
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.gulftech.org/?node=research&article_id=00087-07012005
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable Vendor Advisory
http://www.hardened-php.net/advisory-022005.php
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://www.mandriva.com/security/advisories?name=MDKSA-2005:109
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_18_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.novell.com/linux/security/advisories/2005_41_php_pear.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.novell.com/linux/security/advisories/2005_49_php.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2005-564.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/archive/1/419064/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/14088
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2005/2827
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link

100 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
86.2%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

debian tiki php drupal gggeek