CVE-2006-0147
Dynamic code evaluation vulnerability in tests/tmssql.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PhpOpenChat, possibly (7) MAXdev MD-Pro, and (8) Simplog, allows remote attackers to execute arbitrary PHP functions via the do parameter, which is saved in a variable that is then executed as a function, as demonstrated using phpinfo.
Published
2006-01-09T23:03:00.000
Last Modified
2025-04-03T01:03:51.193
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 7.5 (HIGH)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: PARTIAL
- Availability Impact: PARTIAL
Exploitability Score
10.0
Impact Score
6.4
Weaknesses
-
Type: Primary
NVD-CWE-Other
Affected Vendors & Products
References
-
http://retrogod.altervista.org/phpopenchat_30x_sql_xpl.html
Exploit
([email protected])
-
http://retrogod.altervista.org/simplog_092_incl_xpl.html
Exploit
([email protected])
-
http://secunia.com/advisories/17418
Exploit, Patch, Vendor Advisory
([email protected])
-
http://secunia.com/advisories/18233
Patch, Vendor Advisory
([email protected])
-
http://secunia.com/advisories/18254
Patch, Vendor Advisory
([email protected])
-
http://secunia.com/advisories/18260
Patch, Vendor Advisory
([email protected])
-
http://secunia.com/advisories/18267
Vendor Advisory
([email protected])
-
http://secunia.com/advisories/18276
Patch, Vendor Advisory
([email protected])
-
http://secunia.com/advisories/19555
Patch, Vendor Advisory
([email protected])
-
http://secunia.com/advisories/19590
Patch, Vendor Advisory
([email protected])
-
http://secunia.com/advisories/19591
Patch, Vendor Advisory
([email protected])
-
http://secunia.com/advisories/19600
Vendor Advisory
([email protected])
-
http://secunia.com/advisories/19628
Patch, Vendor Advisory
([email protected])
-
http://secunia.com/advisories/19691
([email protected])
-
http://secunia.com/secunia_research/2005-64/advisory/
Exploit, Patch, Vendor Advisory
([email protected])
-
http://www.debian.org/security/2006/dsa-1029
Patch, Vendor Advisory
([email protected])
-
http://www.debian.org/security/2006/dsa-1030
Patch, Vendor Advisory
([email protected])
-
http://www.debian.org/security/2006/dsa-1031
([email protected])
-
http://www.gentoo.org/security/en/glsa/glsa-200604-07.xml
Patch, Vendor Advisory
([email protected])
-
http://www.osvdb.org/22291
([email protected])
-
http://www.securityfocus.com/archive/1/430448/100/0/threaded
([email protected])
-
http://www.securityfocus.com/archive/1/430743/100/0/threaded
([email protected])
-
http://www.vupen.com/english/advisories/2006/0101
([email protected])
-
http://www.vupen.com/english/advisories/2006/0102
([email protected])
-
http://www.vupen.com/english/advisories/2006/0103
([email protected])
-
http://www.vupen.com/english/advisories/2006/0104
([email protected])
-
http://www.vupen.com/english/advisories/2006/1305
([email protected])
-
http://www.vupen.com/english/advisories/2006/1332
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/24052
([email protected])
-
https://www.exploit-db.com/exploits/1663
([email protected])
-
http://retrogod.altervista.org/phpopenchat_30x_sql_xpl.html
Exploit
(af854a3a-2127-422b-91ae-364da2661108)
-
http://retrogod.altervista.org/simplog_092_incl_xpl.html
Exploit
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/17418
Exploit, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/18233
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/18254
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/18260
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/18267
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/18276
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/19555
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/19590
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/19591
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/19600
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/19628
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/19691
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/secunia_research/2005-64/advisory/
Exploit, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.debian.org/security/2006/dsa-1029
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.debian.org/security/2006/dsa-1030
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.debian.org/security/2006/dsa-1031
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.gentoo.org/security/en/glsa/glsa-200604-07.xml
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.osvdb.org/22291
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/archive/1/430448/100/0/threaded
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/archive/1/430743/100/0/threaded
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2006/0101
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2006/0102
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2006/0103
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2006/0104
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2006/1305
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2006/1332
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/24052
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.exploit-db.com/exploits/1663
(af854a3a-2127-422b-91ae-364da2661108)