Security Advisory 2005-03-06

Execution of arbitrary PHP code in phpMyFAQ version 1.4 and 1.5

Issued on:
2005-06-29
Software:
phpMyFAQ version 1.4 and 1.5
Risk:
high
Platforms:
all

The phpMyFAQ Team has learned of a serious security issue that has been discovered in our bundled library XML-RPC we use in phpMyFAQ 1.4 and 1.5.

Description

The vulnerability is caused due to an unspecified error, which can be exploited to execute arbitrary PHP code via an application using the vulnerable library.

Impact

This issue allows for possible remote code execution.

Solution

The phpMyFAQ Team has released a new phpMyFAQ version 1.4.9 and 1.5.0 RC5, which incorporate a fixed bundled library XML-RPC. All users of affected phpMyFAQ versions are encouraged to upgrade as soon as possible to this latest version.

Workaround

As a temporary hotfix you can delete your xmlrpcs.php and xmlrpcs.php file in the directory inc/ so that your FAQ will not easily allow execution of maliclius XML-RPC method calls.

Credits

Please read this advisory, too.

Back to the security advisories overview