[Full-Disclosure] PHP-Nuke x.x AND PostNuke x.x SQL Injection
pedro.inacio at netropolis.pt
Thu Sep 26 19:34:07 BST 2002
just to say that PostNuke ( fork of PHP-Nuke ) is vulnerable to the same
it is possible to inject different SQL code in order to do other "funny" but
Note to the guys of those projects:
Filter those URL entries!!!
----- Original Message -----
From: "Pedro Inacio" <pedro.inacio at netropolis.pt>
To: <full-disclosure at lists.netsys.com>
Sent: Wednesday, September 25, 2002 1:02 AM
Subject: [Full-Disclosure] PHP-Nuke x.x SQL Injection
> All PHP-Nuke versions, including the just released 6.0, are vulnerable to
> very simple SQL injection that may lead to a basic DoS attack.
> For instance, if you create a short script, to send a few requests, (I
> tested with just 6) similar to this:
> after a real short time the load of the machine is so high that it will
> become inacessible.
> When the script is stopped, the server will take a few minutes to recover
> from the load and become acessible again.
> Well, the number of requests depends on your MySQL parameters and
> but in general all the tested php-nuke sites where vulnerable and become
> If you are running PHP-Nuke, I suggest the creation of some filters to
> this kind of attack.
> Other things can be made, but I will not talk about them now. I will wait
> until Francisco fix them.
> Francisco was noticed a month ago, but the problems persist.
> Pedro Inacio
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
Full-Disclosure is hosted and sponsored by Secunia.