HTTP: phpRPC Library Remote Code Execution
This signature detects a HTTP POST request containing maliciously crafted XML code. By including some PHP code in a <base64> XML tag, a client can cause arbitrary php code to be executed on the server.
Extended Description
phpRPC is prone to a remote code-execution vulnerability. This issue exists because the library fails to adequately sanitize user-supplied data. PHP scripts that implement the phpRPC library, such as RunCMS, may also be affected by this issue.
Affected Products
Runcms runcms
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Runcms
Phprpc