PHP-Nuke *forwhat* SQL Injection Vulnerability

Posted on Wednesday, November 01, 2006 @ 09:01:40 CST in Security
by Raven

SECUNIA ADVISORY ID: SA22617

VERIFY ADVISORY: http://secunia.com/advisories/22617/

CRITICAL: Moderately critical

IMPACT: Manipulation of data

WHERE: >From remote

SOFTWARE: PHP-Nuke 7.x - http://secunia.com/product/2385/

DESCRIPTION: Paisterist has discovered a vulnerability in PHP-Nuke, which can be exploited by malicious people to conduct SQL injection attacks. Input passed to the "forwhat" parameter in modules/journal/search.php is not properly sanitised, before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerability is confirmed in version 7.9. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY: Paisterist

ORIGINAL ADVISORY: http://www.neosecurityteam.net/index.php?action=advisories&id=29
 
 
click Related        click Share
 
News ©

Site Info

Last SeenLast Seen
  • kguske
  • nextgen
Server TrafficServer Traffic
  • Total: 504,324,304
  • Today: 294,483
Server InfoServer Info
  • Mar 11, 2025
  • 11:22 pm CDT