Dynamic code evaluation vulnerability in tests/tmssql.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PhpOpenChat, possibly (7) MAXdev MD-Pro, and (8) Simplog, allows remote attackers to execute arbitrary PHP functions via the do parameter, which is saved in a variable that is then executed as a function, as demonstrated using phpinfo.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 00:05
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://retrogod.altervista.org/phpopenchat_30x_sql_xpl.html - Exploit | |
| References | () http://retrogod.altervista.org/simplog_092_incl_xpl.html - Exploit | |
| References | () http://secunia.com/advisories/17418 - Exploit, Patch, Vendor Advisory | |
| References | () http://secunia.com/advisories/18233 - Patch, Vendor Advisory | |
| References | () http://secunia.com/advisories/18254 - Patch, Vendor Advisory | |
| References | () http://secunia.com/advisories/18260 - Patch, Vendor Advisory | |
| References | () http://secunia.com/advisories/18267 - Vendor Advisory | |
| References | () http://secunia.com/advisories/18276 - Patch, Vendor Advisory | |
| References | () http://secunia.com/advisories/19555 - Patch, Vendor Advisory | |
| References | () http://secunia.com/advisories/19590 - Patch, Vendor Advisory | |
| References | () http://secunia.com/advisories/19591 - Patch, Vendor Advisory | |
| References | () http://secunia.com/advisories/19600 - Vendor Advisory | |
| References | () http://secunia.com/advisories/19628 - Patch, Vendor Advisory | |
| References | () http://secunia.com/advisories/19691 - | |
| References | () http://secunia.com/secunia_research/2005-64/advisory/ - Exploit, Patch, Vendor Advisory | |
| References | () http://www.debian.org/security/2006/dsa-1029 - Patch, Vendor Advisory | |
| References | () http://www.debian.org/security/2006/dsa-1030 - Patch, Vendor Advisory | |
| References | () http://www.debian.org/security/2006/dsa-1031 - | |
| References | () http://www.gentoo.org/security/en/glsa/glsa-200604-07.xml - Patch, Vendor Advisory | |
| References | () http://www.osvdb.org/22291 - | |
| References | () http://www.securityfocus.com/archive/1/430448/100/0/threaded - | |
| References | () http://www.securityfocus.com/archive/1/430743/100/0/threaded - | |
| References | () http://www.vupen.com/english/advisories/2006/0101 - | |
| References | () http://www.vupen.com/english/advisories/2006/0102 - | |
| References | () http://www.vupen.com/english/advisories/2006/0103 - | |
| References | () http://www.vupen.com/english/advisories/2006/0104 - | |
| References | () http://www.vupen.com/english/advisories/2006/1305 - | |
| References | () http://www.vupen.com/english/advisories/2006/1332 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24052 - | |
| References | () https://www.exploit-db.com/exploits/1663 - | 
Information
                Published : 2006-01-09 23:03
Updated : 2025-04-03 01:03
NVD link : CVE-2006-0147
Mitre link : CVE-2006-0147
CVE.ORG link : CVE-2006-0147
JSON object : View
Products Affected
                mantis
- mantis
the_cacti_group
- cacti
postnuke_software_foundation
- postnuke
moodle
- moodle
john_lim
- adodb
CWE
                