vendor:
PostNuke Journal
by:
Ali Abbasi
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: PostNuke Journal
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
2007
PostNuke Journal
The vulnerability allows an attacker to perform SQL injection by manipulating the 'id' parameter in the 'index.php?module=v4bJournal&func=journal_comment' URL. By using a specially crafted payload, an attacker can retrieve sensitive information from the 'nuke_users' table.
Mitigation:
The vendor should sanitize and validate user input to prevent SQL injection attacks. Additionally, prepared statements or parameterized queries should be used to mitigate the risk of SQL injection.