View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0006650 | mantisbt | security | public | 2006-01-29 16:17 | 2006-10-09 11:55 |
Reporter | vboctor | Assigned To | vboctor | ||
Priority | normal | Severity | major | Reproducibility | always |
Status | closed | Resolution | fixed | ||
Product Version | 1.0.0rc4 | ||||
Fixed in Version | 1.0.0 | ||||
Summary | 0006650: ADOdb can be exploited to execute arbitrary SQL code | ||||
Description | Secunia Research has discovered that Mantis stores test scripts for the The presence of the "server.php" and "tmssql.php" test scripts have been Please respond as soon as possible. We have assigned Secunia Advisory Below is the original description of the security issues sent to the Secunia Research has discovered two security issues in ADOdb, which can 1) The problem is caused due to the presence of the insecure Example: Successful exploitation requires that the MySQL password for the root 2) The problem is caused due to the presence of the insecure Example: Successful exploitation requires that the affected script is placed The security issues have been confirmed in versions 4.66 and 4.68. Other -- Andreas Sandblad | ||||
Tags | No tags attached. | ||||
As far as I can tell, ADOdb 4.71 is no longer vulnerable... it now restricts connections to 127.0.0.1, tries by default to connect to MySQL with a non-blank password, and only allows certain specific PHP functions to be specified via GET parameter. |
|
The first for now (until we upgrade to a patched version of ADODB)
|
|
This is now fixed on the 1.0.0rc5 branch, and hence will be included in 1.0.0rc6 or 1.0.0 whatever the next release is. It is also applied to the main trunk which means that it is applied to 1.1.0. |
|