Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200508-14 ] TikiWiki, eGroupWare: Arbitrary command execution through XML-RPC
Date: Wed, 24 Aug 2005 19:57:29
Message-Id: 430CCE6A.3080704@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200508-14
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: TikiWiki, eGroupWare: Arbitrary command execution through
9 XML-RPC
10 Date: August 24, 2005
11 Bugs: #102374, #102377
12 ID: 200508-14
13
14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
15
16 Synopsis
17 ========
18
19 TikiWiki and eGroupWare both include PHP XML-RPC code vulnerable to
20 arbitrary command execution.
21
22 Background
23 ==========
24
25 TikiWiki is a full featured Free Software Wiki, CMS and Groupware
26 written in PHP. eGroupWare is a web-based collaboration software suite.
27 Both TikiWiki and eGroupWare include a PHP library to handle XML-RPC
28 requests.
29
30 Affected packages
31 =================
32
33 -------------------------------------------------------------------
34 Package / Vulnerable / Unaffected
35 -------------------------------------------------------------------
36 1 www-apps/tikiwiki < 1.8.5-r2 >= 1.8.5-r2
37 2 www-apps/egroupware < 1.0.0.009 >= 1.0.0.009
38 -------------------------------------------------------------------
39 2 affected packages on all of their supported architectures.
40 -------------------------------------------------------------------
41
42 Description
43 ===========
44
45 The XML-RPC library shipped in TikiWiki and eGroupWare improperly
46 handles XML-RPC requests and responses with malformed nested tags.
47
48 Impact
49 ======
50
51 A remote attacker could exploit this vulnerability to inject arbitrary
52 PHP script code into eval() statements by sending a specially crafted
53 XML document to TikiWiki or eGroupWare.
54
55 Workaround
56 ==========
57
58 There is no known workaround at this time.
59
60 Resolution
61 ==========
62
63 All TikiWiki users should upgrade to the latest version:
64
65 # emerge --sync
66 # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.5-r2"
67
68 All eGroupWare users should upgrade to the latest version:
69
70 # emerge --sync
71 # emerge --ask --oneshot --verbose ">=www-apps/egroupware-1.0.0.009"
72
73 References
74 ==========
75
76 [ 1 ] CAN-2005-2498
77 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498
78
79 Availability
80 ============
81
82 This GLSA and any updates to it are available for viewing at
83 the Gentoo Security Website:
84
85 http://security.gentoo.org/glsa/glsa-200508-14.xml
86
87 Concerns?
88 =========
89
90 Security is a primary focus of Gentoo Linux and ensuring the
91 confidentiality and security of our users machines is of utmost
92 importance to us. Any security concerns should be addressed to
93 security@g.o or alternatively, you may file a bug at
94 http://bugs.gentoo.org.
95
96 License
97 =======
98
99 Copyright 2005 Gentoo Foundation, Inc; referenced text
100 belongs to its owner(s).
101
102 The contents of this document are licensed under the
103 Creative Commons - Attribution / Share Alike license.
104
105 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature