Eval injection vulnerability in PHPXMLRPC 1.1.1 and earlier (PEAR XML-RPC for PHP), as used in multiple products including (1) Drupal, (2) phpAdsNew, (3) phpPgAds, and (4) phpgroupware, allows remote attackers to execute arbitrary PHP code via certain nested XML tags in a PHP document that should not be nested, which are injected into an eval function call, a different vulnerability than CVE-2005-1921.
References
Link Providers
http://marc.info/?l=bugtraq&m=112412415822890&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=112431497300344&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=112605112027335&w=2 cve-icon cve-icon
http://secunia.com/advisories/16431 cve-icon cve-icon
http://secunia.com/advisories/16432 cve-icon cve-icon
http://secunia.com/advisories/16441 cve-icon cve-icon
http://secunia.com/advisories/16460 cve-icon cve-icon
http://secunia.com/advisories/16465 cve-icon cve-icon
http://secunia.com/advisories/16468 cve-icon cve-icon
http://secunia.com/advisories/16469 cve-icon cve-icon
http://secunia.com/advisories/16491 cve-icon cve-icon
http://secunia.com/advisories/16550 cve-icon cve-icon
http://secunia.com/advisories/16558 cve-icon cve-icon
http://secunia.com/advisories/16563 cve-icon cve-icon
http://secunia.com/advisories/16619 cve-icon cve-icon
http://secunia.com/advisories/16635 cve-icon cve-icon
http://secunia.com/advisories/16693 cve-icon cve-icon
http://secunia.com/advisories/16976 cve-icon cve-icon
http://secunia.com/advisories/17053 cve-icon cve-icon
http://secunia.com/advisories/17066 cve-icon cve-icon
http://secunia.com/advisories/17440 cve-icon cve-icon
http://www.debian.org/security/2005/dsa-789 cve-icon cve-icon
http://www.debian.org/security/2005/dsa-798 cve-icon cve-icon
http://www.debian.org/security/2005/dsa-840 cve-icon cve-icon
http://www.debian.org/security/2005/dsa-842 cve-icon cve-icon
http://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.html cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200509-19.xml cve-icon cve-icon
http://www.hardened-php.net/advisory_152005.67.html cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2005_49_php.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2005-748.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/408125 cve-icon cve-icon
http://www.securityfocus.com/bid/14560 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2005-2498 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9569 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2005-2498 cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2005-08-15T04:00:00

Updated: 2024-08-07T22:30:01.018Z

Reserved: 2005-08-08T00:00:00

Link: CVE-2005-2498

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2005-08-15T04:00:00.000

Modified: 2024-02-14T15:47:32.573

Link: CVE-2005-2498

cve-icon Redhat

Severity : Important

Publid Date: 2005-08-14T00:00:00Z

Links: CVE-2005-2498 - Bugzilla