Ravens PHP Scripts: Postnuke



Search on This Topic:   
[ Go to Home | Select a New Topic ]
 

 

PostNuke *error.php* Local File Inclusion More about

Posted on Tuesday, November 21, 2006 @ 08:48:08 CST in Postnuke
by Raven

SECUNIA ADVISORY ID: SA22983

VERIFY ADVISORY: http://secunia.com/advisories/22983/

CRITICAL: Moderately critical

IMPACT: Exposure of sensitive information

SOFTWARE: PostNuke 0.x - http://secunia.com/product/350/

DESCRIPTION: A vulnerability has been reported in PostNuke, which can be exploited by malicious people to disclose sensitive information. Input passed to the "PNSVlang" variable is not properly sanitised before it is used to include files in error.php. This can be exploited to include arbitrary files via directory traversal attacks. The vulnerability is reported in versions prior to 0.764.

SOLUTION: Update to version 0.764.

PROVIDED AND/OR DISCOVERED BY: The vendor credits Kacper.

ORIGINAL ADVISORY: http://community.postnuke.com/index.php?name=News&file=article&sid=2787
 

 
nukeevangelist writes:  
TextAds [very powerful] see more at the TextAds SourceForge-Page :: TextAds-project [more info] - well you see this is acutally a pn-scriptaddon but worth to port over! You can get more insights into fully fledged demos - please follow all the links in this article

What are TextAds? TextAds are a simple, polite, and inexpensive alternative to banners and other online advertising.

How do TextAds work? TextAds are inserted into webpages just like any other content. Visitors see a small text box with your link and text similar to the example below:

TextAds is a text ad management system for websites using PHP. It has been deployed with content management systems like PostNuke and should work with any PHP based website.
 Read More...
 

 

PostNuke Security Advisory PNSA 2005-1 More about

Posted on Monday, February 28, 2005 @ 21:41:02 CST in Postnuke
by sixonetonoffun

DESCRIPTION
Vulnerability : SQL injection, various missing input/output validations: 0.750+
The PostNuke Development Team was notified about a couple of security issues within the current .760RC2 and has decided to backport the fixes also to the stable .750 package.
Get more detail and patched files from Here
CREDITS
The exploits have been originally found by Maksymilian Arciemowicz from http://www.securityreason.com/ and were reported via security contact.
 

 

KISGB For PostNuke - Coming Soon! More about

Posted on Sunday, March 16, 2003 @ 08:41:58 CST in Postnuke
by gcf

I have begun the modifications to port KISGB to Postnuke! I need volunteers to form a test group, just as I did with the phpNuke port. Either contact me privately or leave a message here, for those who are interested. I am developing this under the .723 release.

Click here for my Postnuke test site. At the present, this is just a test site to allow you to see the progress. But, I do like the look and feel of this latest release. Hmmm. I wonder ........
 



Page 1 of 1 (4 total stories) [ 1 ]  

News ©

Site Info

Last SeenLast Seen
  • misterstereus
  • kguske
Server TrafficServer Traffic
  • Total: 499,486,224
  • Today: 13,708
Server InfoServer Info
  • Feb 15, 2025
  • 03:20 am CST