Dynamic code evaluation vulnerability in tests/tmssql.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PhpOpenChat, possibly (7) MAXdev MD-Pro, and (8) Simplog, allows remote attackers to execute arbitrary PHP functions via the do parameter, which is saved in a variable that is then executed as a function, as demonstrated using phpinfo.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1029-1 | New libphp-adodb packages fix several vulnerabilities |
![]() |
DSA-1030-1 | New moodle packages fix several vulnerabilities |
![]() |
DSA-1031-1 | New cacti packages fix several vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T16:25:33.633Z
Reserved: 2006-01-09T00:00:00
Link: CVE-2006-0147

No data.

Status : Deferred
Published: 2006-01-09T23:03:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2006-0147

No data.

No data.