Rapid7 Vulnerability & Exploit Database

Moodle: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CVE-2006-0146)

Back to Search

Moodle: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CVE-2006-0146)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
01/09/2006
Created
11/13/2019
Added
11/07/2019
Modified
11/07/2019

Description

The server.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PHPOpenChat, (7) MAXdev MD-Pro, and (8) MediaBeez, when the MySQL root password is empty, allows remote attackers to execute arbitrary SQL commands via the sql parameter.

Solution(s)

  • moodle-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;