ws-users mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
Subject XML-RPC security question and Apache implementation
Date Tue, 02 May 2006 19:23:11 GMT


Is the Apache implementation of XML-RPC patched in terms of the eval()
security hole?

Here is what I have read at the following site

"A vulnerability has been reported in XML-RPC due to insufficient
sanitization of certain XML tags that are nested in parsed documents being
used in an 'eval()' call, which could let a remote malicious user execute
arbitrary PHP code."


View raw message