vendor:
PHPNuke
by:
David@cgishield.com
7.5
CVSS
HIGH
SQL Injection Attack
89
CWE
Product Name: PHPNuke
Affected Version From: PHPNuke 5.6
Affected Version To: PHPNuke 6.0
Patch Exists: YES
Related CWE: N/A
CPE: a:phpnuke:phpnuke
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002
PHPNuke Auto-SelectFish Attacker
PHPNuke, in some cases, does not sufficiently sanitize user-supplied input which is used when constructing SQL queries. As a result, attackers may supply malicious parameters to manipulate the structure and logic of SQL queries. This may result in unauthorized operations being performed on the underlying database. This issue may be exploited to cause sensitive information to be disclosed to a remote attacker.
Mitigation:
Input validation should be used to ensure that untrusted data is not used to construct SQL queries in an unsafe manner.