GulfTech has discovered vulnerabilities in XML-RPC for PHP and PEAR XML_RPC, which implement web services using HTTP and the PHP scripting language. Flawed input validation in the parseRequest() function in XML RPC (remote procedure call) servers could allow an attacker to use single quote attributes to escape into the eval() function to execute arbitrary code. A number of popular web applications, such as PostNuke, Drupal, b2evolution, and TikiWiki, use PHPXMLRPC protocol, built on XML-RPC for PHP. A new version of PHPXMLRPC is available to fix the problem. The PEAR XML_RPC flaw resembles the PHPXMLRPC flaw, and is fixed by newly released version 1.3.1 of the software...