Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200507-06 ] TikiWiki: Arbitrary command execution through XML-RPC
Date: Wed, 06 Jul 2005 20:51:46
Message-Id: 200507062229.46125.jaervosz@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200507-06
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: TikiWiki: Arbitrary command execution through XML-RPC
9 Date: July 06, 2005
10 Bugs: #97648
11 ID: 200507-06
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 TikiWiki includes PHP XML-RPC code, making it vulnerable to arbitrary
19 command execution.
20
21 Background
22 ==========
23
24 TikiWiki is a web-based groupware and content management system (CMS),
25 using PHP, ADOdb and Smarty. TikiWiki includes vulnerable PHP XML-RPC
26 code.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 www-apps/tikiwiki < 1.8.5-r1 >= 1.8.5-r1
35
36 Description
37 ===========
38
39 TikiWiki is vulnerable to arbitrary command execution as described in
40 GLSA 200507-01.
41
42 Impact
43 ======
44
45 A remote attacker could exploit this vulnerability to execute arbitrary
46 PHP code by sending specially crafted XML data.
47
48 Workaround
49 ==========
50
51 There is no known workaround at this time.
52
53 Resolution
54 ==========
55
56 All TikiWiki users should upgrade to the latest version:
57
58 # emerge --sync
59 # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.5-r1"
60
61 References
62 ==========
63
64 [ 1 ] GLSA 200507-01
65 http://security.gentoo.org/glsa/glsa-200507-01.xml
66 [ 2 ] CAN-2005-1921
67 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921
68
69 Availability
70 ============
71
72 This GLSA and any updates to it are available for viewing at
73 the Gentoo Security Website:
74
75 http://security.gentoo.org/glsa/glsa-200507-06.xml
76
77 Concerns?
78 =========
79
80 Security is a primary focus of Gentoo Linux and ensuring the
81 confidentiality and security of our users machines is of utmost
82 importance to us. Any security concerns should be addressed to
83 security@g.o or alternatively, you may file a bug at
84 http://bugs.gentoo.org.
85
86 License
87 =======
88
89 Copyright 2005 Gentoo Foundation, Inc; referenced text
90 belongs to its owner(s).
91
92 The contents of this document are licensed under the
93 Creative Commons - Attribution / Share Alike license.
94
95 http://creativecommons.org/licenses/by-sa/2.0