This SQL injection bug and another one (in web-link) in Spaiz-Nuke and
PHP-nuke was reported few days ago by 1dt.w0lf (idtwolf_at_sigaret.net)
(sorry, in Russian, but you can see exploitation examples):
http://www.security.nnov.ru/search/document.asp?docid=5201
--Wednesday, October 8, 2003, 7:37:38 PM, you wrote to bugtraq (at) securityfocus (dot) com [email concealed]:
m> Version: PHP-Nuke 6.6
m> Language: PHP
m> Web site: phpnuke.org
m> Status: Vendor has been notified
This SQL injection bug and another one (in web-link) in Spaiz-Nuke and
PHP-nuke was reported few days ago by 1dt.w0lf (idtwolf_at_sigaret.net)
(sorry, in Russian, but you can see exploitation examples):
http://www.security.nnov.ru/search/document.asp?docid=5201
--Wednesday, October 8, 2003, 7:37:38 PM, you wrote to bugtraq (at) securityfocus (dot) com [email concealed]:
m> Version: PHP-Nuke 6.6
m> Language: PHP
m> Web site: phpnuke.org
m> Status: Vendor has been notified
m> There's an SQL injection hole in modules.php.
m> http://phpnuke.org/modules.php?name=Downloads&d_op=viewdownload&cid=59%2
0or%20cid=2
--
~/ZARAZA
Íî Ãàððè... ÿ áåçóñëîâíî îòäàþ ïðåäïî÷òåíèå åìó, çà
âûñîêóþ ïèòàòåëüíîñòü è êàêîå-òî îñîáåííî íåæíîå ìÿñî. (Òâåí)
[ reply ]