First published: Mon Jan 09 2006(Updated: )
Dynamic code evaluation vulnerability in tests/tmssql.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PhpOpenChat, possibly (7) MAXdev MD-Pro, and (8) Simplog, allows remote attackers to execute arbitrary PHP functions via the do parameter, which is saved in a variable that is then executed as a function, as demonstrated using phpinfo.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postnuke Software Foundation Pnphpbb | =0.761 | |
John Lim ADOdb Date Library | =4.66 | |
Cacti | =0.8.6g | |
Mentiss Acgv Acgvannu | =1.0.0_rc4 | |
John Lim ADOdb Date Library | =4.68 | |
Moodle | =1.5.3 | |
Mentiss Acgv Acgvannu | =0.19.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0147 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2006-0147, upgrade ADOdb to version 4.70 or later.
CVE-2006-0147 affects multiple products including Mantis, PostNuke, Moodle, Cacti, and various versions of ADOdb.
CVE-2006-0147 allows remote attackers to execute arbitrary code on affected systems.
Yes, CVE-2006-0147 can be exploited by an attacker remotely without needing authentication.