var-200512-0910
Vulnerability from variot
Multiple SQL injection vulnerabilities in modules.php in PHP-Nuke 7.8, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) name, (2) sid, and (3) pid parameters in a POST request, which bypasses security checks that are performed for GET requests. PHP-Nuke is prone to a sql-injection vulnerability. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. There are multiple SQL injection vulnerabilities in modules.php in PHP-Nuke 7.8. When magic_quotes_gpc is disabled, a remote attacker can execute arbitrary SQL commands. Such requests bypass the security checks performed for GET requests.
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/
TITLE: PHP-Nuke SQL Injection Vulnerabilities
SECUNIA ADVISORY ID: SA16801
VERIFY ADVISORY: http://secunia.com/advisories/16801/
CRITICAL: Moderately critical
IMPACT: Manipulation of data
WHERE:
From remote
SOFTWARE: PHP-Nuke 7.x http://secunia.com/product/2385/
DESCRIPTION: Robin Verton has discovered some vulnerabilities in PHP-Nuke, which can be exploited by malicious people to conduct SQL injection attacks. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerabilities have been confirmed in version 7.7. Version 7.8 and prior are reportedly also be affected.
SOLUTION: Edit the source code to ensure that input is properly sanitised.
PROVIDED AND/OR DISCOVERED BY: Robin Verton
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200512-0910", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "php-nuke", "scope": "eq", "trust": 1.6, "vendor": "francisco burzi", "version": "7.8" }, { "model": "burzi php-nuke", "scope": "eq", "trust": 0.3, "vendor": "francisco", "version": "7.8" } ], "sources": [ { "db": "BID", "id": "86927" }, { "db": "CNNVD", "id": "CNNVD-200512-783" }, { "db": "NVD", "id": "CVE-2005-4715" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "86927" } ], "trust": 0.3 }, "cve": "CVE-2005-4715", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2005-4715", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-15923", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2005-4715", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200512-783", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-15923", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2005-4715", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-15923" }, { "db": "VULMON", "id": "CVE-2005-4715" }, { "db": "CNNVD", "id": "CNNVD-200512-783" }, { "db": "NVD", "id": "CVE-2005-4715" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple SQL injection vulnerabilities in modules.php in PHP-Nuke 7.8, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) name, (2) sid, and (3) pid parameters in a POST request, which bypasses security checks that are performed for GET requests. PHP-Nuke is prone to a sql-injection vulnerability. \nExploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. There are multiple SQL injection vulnerabilities in modules.php in PHP-Nuke 7.8. When magic_quotes_gpc is disabled, a remote attacker can execute arbitrary SQL commands. Such requests bypass the security checks performed for GET requests. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nPHP-Nuke SQL Injection Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA16801\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/16801/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nManipulation of data\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nPHP-Nuke 7.x\nhttp://secunia.com/product/2385/\n\nDESCRIPTION:\nRobin Verton has discovered some vulnerabilities in PHP-Nuke, which\ncan be exploited by malicious people to conduct SQL injection\nattacks. This can be exploited to manipulate SQL\nqueries by injecting arbitrary SQL code. \n\nThe vulnerabilities have been confirmed in version 7.7. Version 7.8\nand prior are reportedly also be affected. \n\nSOLUTION:\nEdit the source code to ensure that input is properly sanitised. \n\nPROVIDED AND/OR DISCOVERED BY:\nRobin Verton\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2005-4715" }, { "db": "BID", "id": "86927" }, { "db": "VULHUB", "id": "VHN-15923" }, { "db": "VULMON", "id": "CVE-2005-4715" }, { "db": "PACKETSTORM", "id": "40022" } ], "trust": 1.44 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "SREASON", "id": "3", "trust": 2.1 }, { "db": "NVD", "id": "CVE-2005-4715", "trust": 2.1 }, { "db": "SECUNIA", "id": "16801", "trust": 1.9 }, { "db": "OSVDB", "id": "19351", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-200512-783", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20050913 RE: PHP NUKE \u003c= 7.8 MULTIPLE SQL INJECTIONS", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20050916 RE: PHP NUKE \u003c= 7.8 MULTIPLE SQL INJECTIONS", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20050912 PHP NUKE \u003c= 7.8 MULTIPLE SQL INJECTIONS", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20050914 RE: PHP NUKE \u003c= 7.8 MULTIPLE SQL INJECTIONS", "trust": 0.6 }, { "db": "XF", "id": "22247", "trust": 0.6 }, { "db": "BID", "id": "86927", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-15923", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2005-4715", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "40022", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-15923" }, { "db": "VULMON", "id": "CVE-2005-4715" }, { "db": "BID", "id": "86927" }, { "db": "PACKETSTORM", "id": "40022" }, { "db": "CNNVD", "id": "CNNVD-200512-783" }, { "db": "NVD", "id": "CVE-2005-4715" } ] }, "id": "VAR-200512-0910", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-15923" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:32:30.983000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-4715" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://archives.neohapsis.com/archives/bugtraq/2005-09/0119.html" }, { "trust": 2.1, "url": "http://archives.neohapsis.com/archives/bugtraq/2005-09/0176.html" }, { "trust": 2.1, "url": "http://archives.neohapsis.com/archives/bugtraq/2005-09/0167.html" }, { "trust": 2.1, "url": "http://archives.neohapsis.com/archives/bugtraq/2005-09/0226.html" }, { "trust": 2.1, "url": "http://www.nukefixes.com/ftopict-1779-.html#7641" }, { "trust": 2.1, "url": "http://securityreason.com/securityalert/3" }, { "trust": 2.0, "url": "http://phpnuke.org/modules.php?name=news\u0026file=article\u0026sid=7434" }, { "trust": 1.8, "url": "http://www.osvdb.org/19351" }, { "trust": 1.8, "url": "http://secunia.com/advisories/16801" }, { "trust": 1.2, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22247" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/22247" }, { "trust": 0.1, "url": "http://phpnuke.org/modules.php?name=news\u0026amp;file=article\u0026amp;sid=7434" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/2385/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/16801/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-15923" }, { "db": "VULMON", "id": "CVE-2005-4715" }, { "db": "BID", "id": "86927" }, { "db": "PACKETSTORM", "id": "40022" }, { "db": "CNNVD", "id": "CNNVD-200512-783" }, { "db": "NVD", "id": "CVE-2005-4715" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-15923" }, { "db": "VULMON", "id": "CVE-2005-4715" }, { "db": "BID", "id": "86927" }, { "db": "PACKETSTORM", "id": "40022" }, { "db": "CNNVD", "id": "CNNVD-200512-783" }, { "db": "NVD", "id": "CVE-2005-4715" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-12-31T00:00:00", "db": "VULHUB", "id": "VHN-15923" }, { "date": "2005-12-31T00:00:00", "db": "VULMON", "id": "CVE-2005-4715" }, { "date": "2005-12-31T00:00:00", "db": "BID", "id": "86927" }, { "date": "2005-09-14T06:31:57", "db": "PACKETSTORM", "id": "40022" }, { "date": "2005-12-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200512-783" }, { "date": "2005-12-31T05:00:00", "db": "NVD", "id": "CVE-2005-4715" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-20T00:00:00", "db": "VULHUB", "id": "VHN-15923" }, { "date": "2017-07-20T00:00:00", "db": "VULMON", "id": "CVE-2005-4715" }, { "date": "2005-12-31T00:00:00", "db": "BID", "id": "86927" }, { "date": "2006-02-14T00:00:00", "db": "CNNVD", "id": "CNNVD-200512-783" }, { "date": "2024-11-21T00:05:00.127000", "db": "NVD", "id": "CVE-2005-4715" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200512-783" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PHP-Nuke modules.php Multiple SQL Injection vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-200512-783" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "sql injection", "sources": [ { "db": "PACKETSTORM", "id": "40022" }, { "db": "CNNVD", "id": "CNNVD-200512-783" } ], "trust": 0.7 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.