发布时间 :2005-12-31 00:00:00
修订时间 :2017-07-19 21:29:23

[原文]Multiple SQL injection vulnerabilities in modules.php in PHP-Nuke 7.8, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) name, (2) sid, and (3) pid parameters in a POST request, which bypasses security checks that are performed for GET requests.

[CNNVD]PHP-Nuke modules.php 多个SQL注入漏洞(CNNVD-200512-783)

        PHP-Nuke 7.8中的modules.php存在多个SQL注入漏洞,当禁用了magic_quotes_gpc时,远程攻击者可以通过在POST请求中的(1)名字,(2) sid和(3)pid参数来执行任意SQL命令。这种请求绕过了为GET请求而执行的安全检查。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  BUGTRAQ  20050912 PHP Nuke <= 7.8 Multiple SQL Injections
(UNKNOWN)  BUGTRAQ  20050914 Re: PHP Nuke <= 7.8 Multiple SQL Injections
(UNKNOWN)  BUGTRAQ  20050913 Re: PHP Nuke <= 7.8 Multiple SQL Injections
(UNKNOWN)  BUGTRAQ  20050916 Re: PHP Nuke <= 7.8 Multiple SQL Injections
(UNKNOWN)  XF  phpnuke-modulephp-sql-injection(22247)

- 漏洞信息

PHP-Nuke modules.php 多个SQL注入漏洞
高危 SQL注入
2005-12-31 00:00:00 2006-02-14 00:00:00
        PHP-Nuke 7.8中的modules.php存在多个SQL注入漏洞,当禁用了magic_quotes_gpc时,远程攻击者可以通过在POST请求中的(1)名字,(2) sid和(3)pid参数来执行任意SQL命令。这种请求绕过了为GET请求而执行的安全检查。

- 公告与补丁


- 漏洞信息

PHP-Nuke modules.php Multiple Parameter SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Unknown Vendor Verified

- 漏洞描述

PHP-Nuke contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the modules.php script not properly sanitizing user-supplied input to the 'name', 'sid', and 'pid' parameters befoer use in SQL queries. This may allow an attacker to inject or manipulate SQL queries in the back-end database.

- 时间线

2005-09-13 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, PHP-Nuke has released a patch to address this vulnerability. The fix does not fully sanitise input passed to the 'name' and 'sid' parameters, it only filters the UNION SQL seperators

- 相关参考

- 漏洞作者