GHSA-m95x-m25c-w9mp

Suggest an improvement
Source
https://github.com/advisories/GHSA-m95x-m25c-w9mp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-m95x-m25c-w9mp/GHSA-m95x-m25c-w9mp.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-m95x-m25c-w9mp
Published
2023-01-11T23:54:47Z
Modified
2024-11-28T05:41:50.702856Z
Summary
XML-RPC for PHP allows access to local files via malicious argument to the Client::send method
Details

Abusing the $method argument of Client::send, it was possible to force the client to access local files or connect to undesired urls instead of the intended target server's url (the one used in the Client constructor).

This weakness only affects installations where all the following conditions apply, at the same time:

  • the xmlrpc Client is used, ie. not xmlrpc servers
  • untrusted data (eg. data from remote users) is used as value for the $method argument of method Client::send(), in conjunction with conditions which trigger usage of curl as http transport (ie. either using the https, http11 or http2 protocols, or calling Client::setUseCurl() beforehand)
  • either have set the Clients return_type property to 'xml', or make the resulting Response's object httpResponse member, which is intended to be used for debugging purposes only, available to 3rd parties, eg. by displaying it to the end user or serializing it in some storage (note that the same data can also be accessed via magic property Response::raw_data, and in the Request's httpResponse member)

This is most likely a very uncommon usage scenario, and as such the chances of exploitation of this issue may be low.

If it is not possible to upgrade to this release of the library at this time, a proactive security measure, to avoid the Client accessing any local file on the server which hosts it, is to add the following call to your code:

  $client->setCurlOptions([CURLOPT_PROTOCOLS, CURLPROTO_HTTPS|CURLPROTO_HTTP]);

Originally reported as issue #81

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-01-11T23:54:47Z"
}
References

Affected packages

Packagist / phpxmlrpc/phpxmlrpc

Package

Name
phpxmlrpc/phpxmlrpc
Purl
pkg:composer/phpxmlrpc/phpxmlrpc

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.9.0

Affected versions

3.*

3.0.0
3.0.1
3.1.0
3.1.1
3.1.2

4.*

4.0.0-alpha
4.0.0
4.0.1
4.1.0
4.1.1
4.2.0
4.2.1
4.2.2
4.3.0
4.3.1
4.3.2
4.4.0
4.4.1
4.4.2
4.4.3
4.5.0
4.5.1
4.5.2
4.6.0
4.6.1
4.7.0
4.7.1
4.7.2
4.8.0
4.8.1