First published: Mon Jan 09 2006(Updated: )
The server.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PHPOpenChat, (7) MAXdev MD-Pro, and (8) MediaBeez, when the MySQL root password is empty, allows remote attackers to execute arbitrary SQL commands via the sql parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postnuke Software Foundation Pnphpbb | =0.761 | |
John Lim ADOdb Date Library | =4.66 | |
Cacti | =0.8.6g | |
Mentiss Acgv Acgvannu | =1.0.0_rc4 | |
John Lim ADOdb Date Library | =4.68 | |
Moodle | =1.5.3 | |
Mentiss Acgv Acgvannu | =0.19.4 | |
MediaBeez |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0146 has a high severity level due to the potential for remote SQL injection attacks.
CVE-2006-0146 affects ADOdb for PHP and several applications including PostNuke, MantisBT, Moodle, and Cacti.
To fix CVE-2006-0146, ensure that the MySQL root password is set and not empty before using affected applications.
Yes, CVE-2006-0146 can be exploited remotely by attackers who can execute arbitrary SQL commands.
CVE-2006-0146 affects ADOdb versions prior to 4.70, specifically 4.66 and 4.68.