Check Point Advisories

Update Protection against Multiple PHP-based Vulnerabilities

Check Point Reference: CPAI-2006-011
Date Published: 12 Feb 2006
Severity: Medium
Last Updated: Tuesday 08 May, 2007
Source: FrSIRT/ADV-2006-0101
SANS organization
Industry Reference:CVE-2006-0146
Protection Provided by:
Who is Vulnerable? ADOdb version 4.68 (for PHP) and prior
Defacing Tool 2.0 by r3v3ng4ns
Vulnerability Description ADOdb is a database abstraction library for PHP. A vulnerability was detected in ADOdb due to the presence pf an insecure ADOdb script that can be exploited by remote attackers to execute malicious PHP commands on the target system.
The 'Defacing Tool 2.0 by r3v3ng4ns' is a suite of php based scripts intended to deface Websites leveraging PHP remote file inclusion. Recently reports have been on the rise on aggressive scanning activity leveraging this tool suite. using this tool, attackers can deface PHP enabled Web sites.
Update/Patch AvaliableADOdb:
Upgrade to ADOdb version 4.70 :
http://sourceforge.net/project/showfiles.php?group_id=42718
Vulnerability DetailsADOdb vulnerability: An input validation error exists in the "tests/tmssql.php" test script that does not properly validate the "do" parameter. This could be exploited by attackers to call arbitrary PHP functions.

Defacing Tool 2.0 by r3v3ng4ns: This tool targets Web hosts that enable the use of remote includes. Various reports received lately have indicated site defacement leveraging this tool.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK