Lucene search

K

PHPNukeEV77.txt

πŸ—“οΈΒ 09 Jan 2006Β 00:00:00Reported byΒ LostmonTypeΒ 
packetstorm
Β packetstorm
πŸ”—Β packetstormsecurity.comπŸ‘Β 21Β Views

PHPNuke EV 7.7 'search' module SQL injection vulnerability. Input passed to "query" parameter is not sanitized, allowing SQL injection attacks. No official solution available. A possible fix involves adding code to detect and prevent UNION SELECT command

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`###############################################  
PHPNuke EV 7.7 'search' module 'query' variable SQL injection  
Vendor url: http://nukevolution.com/  
exploit available:yes vendor notify:yes  
advisore:http://lostmon.blogspot.com/2006/01/  
phpnuke-ev-77-search-module-query.html  
################################################  
  
PHPNuke EV 7.7 have a flaw which can be exploited by malicious  
people to conduct SQL injection attacks.  
  
Input passed to the "query" parameter when performing a search isn't  
properly sanitised before being used in a SQL query. This can be  
exploited to manipulate SQL queries by injecting arbitrary SQL code.  
  
#################  
versions:  
################  
  
PHPNuke EV 7.7 -R1  
  
posible prior versions are afected.  
  
##################  
solution:  
###################  
  
No solution at this time!!!  
  
A posible fix:  
  
Open file modules/Search/index.php and after this code:  
------------------------------------  
require_once("mainfile.php");  
$instory = '';  
$module_name = basename(dirname(__FILE__));  
get_lang($module_name);  
----------------------------------------------  
  
you can add this other :  
  
------------------------------------  
  
if(eregi("UNION SELECT",$query) || eregi("UNION%20SELECT",$query)){  
die();  
}  
----------------------------------------------  
this is a "simple fix " only detect UNION SELECT comand and die  
if this is in the query variable... you can write the same code for  
UNION ALL SELECT or other varians of xploit  
  
####################  
Timeline  
####################  
  
discovered:21-11-2005  
vendor notify:29-12-2005 (forums)  
vendor response:-------  
vendor fix:-----  
disclosure:09-01-2006  
  
###################  
example:  
###################  
  
go to  
http://[Victim]/modules.php?name=Search  
  
and write in the search box this proof  
  
s%') UNION SELECT 0,user_id,username,user_password,0,0,0,0,0,0 FROM nuke_users/*  
  
all users hashes are available to view..  
  
#################### Β€nd ########################  
  
Thnx to estrella to be my ligth  
  
  
--  
atentamente:  
Lostmon ([email protected])  
Web-Blog: http://lostmon.blogspot.com/  
--  
La curiosidad es lo que hace mover la mente....  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo