header-logo
Suggest Exploit
vendor:
PHP-Nuke
by:
5.5
CVSS
MEDIUM
Cross-Site Scripting (XSS), SQL Injection, Denial of Service (DoS)
79 (XSS), 89 (SQL Injection), 400 (DoS)
CWE
Product Name: PHP-Nuke
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

PHP-Nuke Multiple Vulnerabilities

PHP-Nuke is prone to multiple vulnerabilities including cross-site scripting (XSS) in the 'Faq', 'Encyclopedia', and 'Reviews' modules, SQL injection in the 'Reviews' module, and a remote denial of service (DoS) vulnerability in the score subsystem of the 'Review' module. These vulnerabilities occur due to insufficient sanitization of user-supplied data, allowing remote attackers to execute malicious code, modify database queries, and deny service to legitimate users.

Mitigation:

To mitigate these vulnerabilities, PHP-Nuke users should apply the latest patches or updates provided by the vendor. Additionally, input validation and sanitization should be implemented to prevent the execution of malicious code and SQL injection attacks. Regular security audits and penetration testing are also recommended to identify and address any potential vulnerabilities.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/10524/info
 
PHP-Nuke is prone to multiple vulnerabilities. The issues result from insufficient sanitization of user-supplied data. The following specific issues can affect the application:
 
PHP-Nuke is prone to multiple cross-site scripting vulnerabilities. These issues affect the 'Faq', 'Encyclopedia' and 'Reviews' modules.
 
These cross-site scripting issues could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If a user follows the malicious link, the attacker-supplied code executes in the Web browser of the victim computer.
 
PHP-Nuke is prone to an SQL Injection Vulnerability. Again the issue is due to a failure of the application to properly sanitize user-supplied input. The problem presents itself when SQL syntax is passed through the a parameter of the 'Reviews' module.
 
As a result of this issue an attacker could modify the logic and structure of database queries.
 
Finally a remote denial of service vulnerability is reported to exist in the score subsystem of the 'Review' module of PHP-Nuke, it is reported that a large number supplied as a value for a parameter passed to the 'Reviews' module will deny service to legitimate PHP-Nuke users. 

http://www.example.com/nuke73/modules.php?name=Encyclopedia&op=terms&eid=1&ltr=[xss code here]
http://www.example.com/nuke73/modules.php?name=Encyclopedia&file=search&eid=[xss code here]
http://www.example.com/nuke73/modules.php?name=Encyclopedia&file=search&query=f00bar&eid=[xss code here]
http://www.example.com/nuke73/modules.php?name=Encyclopedia&op=content&tid=774&page=2&query=[xss code here]