XML-RPC Vulnerability and b2evolution

I think that I am protected from the PHP XML-RPC vulnerability discovered by Secunia. However, the team at b2evolution have made only a cursory attempt to explain what is happening.
I have updated the xmlrpc.php file on my serv to the latest CVS version and also updated the PHP XML-RPC library in PEAR.
Looking forward to a clearer posting on why b2evolution is NOT vulnerable to this type of attack.


Technorati: , , ,

4 Replies to “XML-RPC Vulnerability and b2evolution”

  1. b2evo is affected by this, and you should apply the fix provided by Francois immediately if you haven’t done so already.

  2. is affected by this, and you should apply the fix provided by Francois immediately if you haven't done so already.

Leave a Reply

Your email address will not be published. Required fields are marked *