phpGroupWare, eGroupWare: PHP script injection vulnerability phpGroupWare and eGroupWare include an XML-RPC implementation which allows remote attackers to execute arbitrary PHP script commands. phpgroupware egroupware July 10, 2005 July 10, 2005: 01 97460 97651 remote 0.9.16.006 0.9.16.006 1.0.0.008 1.0.0.008

phpGroupWare and eGroupWare are web based collaboration software suites.

The XML-RPC implementations of phpGroupWare and eGroupWare fail to sanitize input sent to the XML-RPC server using the "POST" method.

A remote attacker could exploit the XML-RPC vulnerability to execute arbitrary PHP script code by sending specially crafted XML data to the XML-RPC servers of phpGroupWare or eGroupWare.

There are no known workarounds at this time.

All phpGroupWare users should upgrade to the latest available version:

# emerge --sync # emerge --ask --oneshot --verbose ">=www-app/phpgroupware-0.9.16.006"

All eGroupWare users should upgrade to the latest available version:

# emerge --sync # emerge --ask --oneshot --verbose ">=www-app/egroupware-1.0.0.008"
CAN-2005-1921 koon DerCorny DerCorny