var-200405-0059
Vulnerability from variot
SQL injection vulnerability in the Downloads module in Php-Nuke 6.x through 7.2 allows remote attackers to execute arbitrary SQL via the (1) orderby or (2) sid parameters to modules.php. Multiple SQL vulnerabilities have been identified in the 'modules.php' module of the application. These vulnerabilities may allow a remote attacker to manipulate query logic, potentially leading to unauthorized access to sensitive information. PHPNuke 7.2 and prior are reported to be prone to these issues. The Downloads module for PHP-Nuke is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. PHP-Nuke is a popular website creation and management tool, it can use many database software as backend, such as MySQL, PostgreSQL, mSQL, Interbase, Sybase, etc. The \'\'modules.php\'\' module included in PHP-Nuke lacks adequate filtering of the input submitted by the user, and remote attackers can use this vulnerability to obtain sensitive information of the user. The \'\'modules.php\'\' module lacks filtering for the \"orderby\" and \"sid\" variables submitted by the user. Submitting malicious SQL commands as this variable data can change the original SQL logic and obtain the database sensitive information or change database information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200405-0059", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "php-nuke", "scope": "eq", "trust": 0.6, "vendor": "francisco burzi", "version": "6.7" }, { "model": "php-nuke", "scope": "eq", "trust": 0.6, "vendor": "francisco burzi", "version": "7.0" }, { "model": "php-nuke", "scope": "eq", "trust": 0.6, "vendor": "francisco burzi", "version": "7.2" }, { "model": "php-nuke", "scope": "eq", "trust": 0.6, "vendor": "francisco burzi", "version": "6.0" }, { "model": "php-nuke", "scope": "eq", "trust": 0.6, "vendor": "francisco burzi", "version": "6.6" }, { "model": "php-nuke", "scope": "eq", "trust": 0.6, "vendor": "francisco burzi", "version": "6.5_rc3" }, { "model": "php-nuke", "scope": "eq", "trust": 0.6, "vendor": "francisco burzi", "version": "6.5" }, { "model": "php-nuke", "scope": "eq", "trust": 0.6, "vendor": "francisco burzi", "version": "7.1" }, { "model": "php-nuke", "scope": "eq", "trust": 0.6, "vendor": "francisco burzi", "version": "6.9" }, { "model": "php-nuke", "scope": "eq", "trust": 0.6, "vendor": "francisco burzi", "version": "7.0_final" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.2" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.1" }, { "model": "burzi php-nuke final", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.0" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.0" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.9" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.7" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.6" }, { "model": "burzi php-nuke rc3", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke rc2", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke rc1", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke final", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke beta", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.51" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.5" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "6.0" }, { "model": "downloads", "scope": "eq", "trust": 0.3, "vendor": "php nuke", "version": "0" } ], "sources": [ { "db": "BID", "id": "10282" }, { "db": "BID", "id": "27932" }, { "db": "CNNVD", "id": "CNNVD-200405-040" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Janek Vind\u203b come2waraxe@yahoo.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200405-040" } ], "trust": 0.6 }, "cve": "CVE-2004-2000", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2004-2000", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-10428", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2004-2000", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200405-040", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-10428", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-10428" }, { "db": "CNNVD", "id": "CNNVD-200405-040" }, { "db": "NVD", "id": "CVE-2004-2000" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SQL injection vulnerability in the Downloads module in Php-Nuke 6.x through 7.2 allows remote attackers to execute arbitrary SQL via the (1) orderby or (2) sid parameters to modules.php. Multiple SQL vulnerabilities have been identified in the \u0027modules.php\u0027 module of the application. These vulnerabilities may allow a remote attacker to manipulate query logic, potentially leading to unauthorized access to sensitive information. \nPHPNuke 7.2 and prior are reported to be prone to these issues. The Downloads module for PHP-Nuke is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. PHP-Nuke is a popular website creation and management tool, it can use many database software as backend, such as MySQL, PostgreSQL, mSQL, Interbase, Sybase, etc. The \\\u0027\\\u0027modules.php\\\u0027\\\u0027 module included in PHP-Nuke lacks adequate filtering of the input submitted by the user, and remote attackers can use this vulnerability to obtain sensitive information of the user. The \\\u0027\\\u0027modules.php\\\u0027\\\u0027 module lacks filtering for the \\\"orderby\\\" and \\\"sid\\\" variables submitted by the user. Submitting malicious SQL commands as this variable data can change the original SQL logic and obtain the database sensitive information or change database information", "sources": [ { "db": "NVD", "id": "CVE-2004-2000" }, { "db": "BID", "id": "10282" }, { "db": "BID", "id": "27932" }, { "db": "VULHUB", "id": "VHN-10428" } ], "trust": 1.53 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-10428", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-10428" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "27932", "trust": 2.0 }, { "db": "BID", "id": "10282", "trust": 2.0 }, { "db": "NVD", "id": "CVE-2004-2000", "trust": 2.0 }, { "db": "SECUNIA", "id": "11553", "trust": 1.7 }, { "db": "OSVDB", "id": "52223", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-200405-040", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20080221 PHP-NUKE MODULE DOWNLOADS SQL INJECTION(SID)", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20040505 [WARAXE-2004-SA#027 - ONCE AGAIN - CRITICAL VULNERABILITIES IN PHPNUKE 6.X - 7.2]", "trust": 0.6 }, { "db": "XF", "id": "16074", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-84619", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "31283", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-10428", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-10428" }, { "db": "BID", "id": "10282" }, { "db": "BID", "id": "27932" }, { "db": "CNNVD", "id": "CNNVD-200405-040" }, { "db": "NVD", "id": "CVE-2004-2000" } ] }, "id": "VAR-200405-0059", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-10428" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:58:05.966000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-2000" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/10282" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/27932" }, { "trust": 1.7, "url": "http://osvdb.org/52223" }, { "trust": 1.7, "url": "http://secunia.com/advisories/11553" }, { "trust": 1.6, "url": "http://www.waraxe.us/index.php?modname=sa\u0026id=27" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/488452/100/0/threaded" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16074" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=108378804809891\u0026w=2" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/16074" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=108378804809891\u0026w=2" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/488452/100/0/threaded" }, { "trust": 0.3, "url": "/archive/1/362266" }, { "trust": 0.3, "url": "http://www.phpnuke.org" }, { "trust": 0.3, "url": "/archive/1/488452" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=108378804809891\u0026amp;w=2" }, { "trust": 0.1, "url": "http://www.waraxe.us/index.php?modname=sa\u0026amp;id=27" } ], "sources": [ { "db": "VULHUB", "id": "VHN-10428" }, { "db": "BID", "id": "10282" }, { "db": "BID", "id": "27932" }, { "db": "CNNVD", "id": "CNNVD-200405-040" }, { "db": "NVD", "id": "CVE-2004-2000" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-10428" }, { "db": "BID", "id": "10282" }, { "db": "BID", "id": "27932" }, { "db": "CNNVD", "id": "CNNVD-200405-040" }, { "db": "NVD", "id": "CVE-2004-2000" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-05-05T00:00:00", "db": "VULHUB", "id": "VHN-10428" }, { "date": "2004-05-05T00:00:00", "db": "BID", "id": "10282" }, { "date": "2008-02-21T00:00:00", "db": "BID", "id": "27932" }, { "date": "2004-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200405-040" }, { "date": "2004-05-05T04:00:00", "db": "NVD", "id": "CVE-2004-2000" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-19T00:00:00", "db": "VULHUB", "id": "VHN-10428" }, { "date": "2004-05-05T00:00:00", "db": "BID", "id": "10282" }, { "date": "2015-05-07T17:32:00", "db": "BID", "id": "27932" }, { "date": "2009-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-200405-040" }, { "date": "2024-11-20T23:52:15.610000", "db": "NVD", "id": "CVE-2004-2000" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "10282" }, { "db": "BID", "id": "27932" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PHP-Nuke modules.php Module SQL Injection vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-200405-040" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "10282" }, { "db": "BID", "id": "27932" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.