Eval injection vulnerability in PHPXMLRPC 1.1.1 and earlier (PEAR XML-RPC for PHP), as used in multiple products including (1) Drupal, (2) phpAdsNew, (3) phpPgAds, and (4) phpgroupware, allows remote attackers to execute arbitrary PHP code via certain nested XML tags in a PHP document that should not be nested, which are injected into an eval function call, a different vulnerability than CVE-2005-1921.
Threat-Mapped Scoring
Score: 0.0
Priority: Unclassified
EPSS
Score: 0.04688 Percentile:
0.88895
CVSS Scoring
CVSS v2 Score: 7.5
Severity:
Mapped CWE(s)
CWE-94
: Improper Control of Generation of Code ('Code Injection')
All CAPEC(s)
CAPEC-242: Code Injection
CAPEC-35: Leverage Executable Code in Non-Executable Files
CAPEC-77: Manipulating User-Controlled Variables
CAPEC(s) with Mapped TTPs
CAPEC-35: Leverage Executable Code in Non-Executable Files
Mapped TTPs: