Family: CGI abuses --> Category: attack
ADODB do Command Execution Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Checks for do parameter command execution vulnerability in ADODB
Detailed Explanation for this Vulnerability Test
The remote web server has a PHP script that is affected by a SQL
The remote host is running ADODB, a database abstraction library for
The installed version of ADODB includes a test script named
'tmssql.php' that fails to sanitize user input to the 'do' parameter
before using it execute PHP code. A possible hacker can exploit this issue
to execute arbitrary PHP code on the affected host subject to the
permissions of the web server user id.
See also :
Remove the test script or upgrade to ADOdb version 4.70 or higher.
High / CVSS Base Score : 7
Click HERE for more information and discussions on this network vulnerability scan.