I think that I am protected from the PHP XML-RPC vulnerability discovered by Secunia. However, the team at b2evolution have made only a cursory attempt to explain what is happening.
I have updated the xmlrpc.php file on my serv to the latest CVS version and also updated the PHP XML-RPC library in PEAR.
Looking forward to a clearer posting on why b2evolution is NOT vulnerable to this type of attack.
Technorati: b2evolution, XML RPC, PHP, Secunia

