phpGroupWare and eGroupWare are web based collaboration software suites.
The XML-RPC implementations of phpGroupWare and eGroupWare fail to sanitize input sent to the XML-RPC server using the "POST" method.
A remote attacker could exploit the XML-RPC vulnerability to execute arbitrary PHP script code by sending specially crafted XML data to the XML-RPC servers of phpGroupWare or eGroupWare.
There are no known workarounds at this time.
All phpGroupWare users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-app/phpgroupware-0.9.16.006"
All eGroupWare users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-app/egroupware-1.0.0.008"