CVE-2006-0147

N/A Unknown
Published: January 09, 2006 Modified: April 16, 2026
View on NVD

Description

Dynamic code evaluation vulnerability in tests/tmssql.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PhpOpenChat, possibly (7) MAXdev MD-Pro, and (8) Simplog, allows remote attackers to execute arbitrary PHP functions via the do parameter, which is saved in a variable that is then executed as a function, as demonstrated using phpinfo.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/17418
Source: cve@mitre.org
Exploit Patch Vendor Advisory
http://secunia.com/advisories/18233
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/18254
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/18260
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/18267
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18276
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/19555
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/19590
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/19591
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/19600
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/19628
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/secunia_research/2005-64/advisory/
Source: cve@mitre.org
Exploit Patch Vendor Advisory
http://www.debian.org/security/2006/dsa-1029
Source: cve@mitre.org
Patch Vendor Advisory
http://www.debian.org/security/2006/dsa-1030
Source: cve@mitre.org
Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200604-07.xml
Source: cve@mitre.org
Patch Vendor Advisory
http://www.osvdb.org/22291
Source: cve@mitre.org
http://retrogod.altervista.org/phpopenchat_30x_sql_xpl.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://retrogod.altervista.org/simplog_092_incl_xpl.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://secunia.com/advisories/17418
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch Vendor Advisory
http://secunia.com/advisories/18233
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18254
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18260
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18267
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18276
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/19555
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/19590
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/19591
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/19600
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/19628
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/19691
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/secunia_research/2005-64/advisory/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch Vendor Advisory
http://www.debian.org/security/2006/dsa-1029
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.debian.org/security/2006/dsa-1030
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.debian.org/security/2006/dsa-1031
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200604-07.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.osvdb.org/22291
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/430448/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/430743/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/0101
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/0102
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/0103
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/0104
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/1305
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/1332
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/24052
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/1663
Source: af854a3a-2127-422b-91ae-364da2661108

60 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
29.7%
97th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

moodle mantis john_lim the_cacti_group postnuke_software_foundation