phpGroupWare, eGroupWare: PHP script injection vulnerability — GLSA 200507-08

phpGroupWare and eGroupWare include an XML-RPC implementation which allows remote attackers to execute arbitrary PHP script commands.

Affected packages

www-apps/phpgroupware on all architectures
Affected versions < 0.9.16.006
Unaffected versions >= 0.9.16.006
www-apps/egroupware on all architectures
Affected versions < 1.0.0.008
Unaffected versions >= 1.0.0.008

Background

phpGroupWare and eGroupWare are web based collaboration software suites.

Description

The XML-RPC implementations of phpGroupWare and eGroupWare fail to sanitize input sent to the XML-RPC server using the "POST" method.

Impact

A remote attacker could exploit the XML-RPC vulnerability to execute arbitrary PHP script code by sending specially crafted XML data to the XML-RPC servers of phpGroupWare or eGroupWare.

Workaround

There are no known workarounds at this time.

Resolution

All phpGroupWare users should upgrade to the latest available version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-app/phpgroupware-0.9.16.006"

All eGroupWare users should upgrade to the latest available version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-app/egroupware-1.0.0.008"

References

Release date
July 10, 2005

Latest revision
July 10, 2005: 01

Severity
high

Exploitable
remote

Bugzilla entries