PHP-Nuke 8.x - Blind SQL Injection

EDB-ID:

14589




Platform:

PHP

Date:

2010-08-09


Become a Certified Penetration Tester

Enroll in Advanced Web Attacks and Exploitation , the course required to become an Offensive Security Web Expert (OSWE)

GET CERTIFIED

#Title: Php Nuke Blind Sql Injection 8.x.x
#Vendor: http://www.php-nuke.org/
#######################################################################
#AUTHOR:  ITSecTeam
#Email:   Bug@ITSecTeam.com
#Website: http://www.itsecteam.com
#Forum :  http://forum.ITSecTeam.com
#Advisory:www.ITSecTeam.com/en/vulnerabilities/vulnerability58.htm
#Thanks:  M3hr@n$,r3dm0v3,am!rkh@n,Platen,Erfan.Blackhat and Dosib
#Discovered By Amin Shokohi(Pejvak)
######################################################################

Poc :modules\Web_Links\index.php line:223
function Add($title, $url, $auth_name, $cat, $description, $email) {
global $prefix, $db, $user;
$url = filter($url, "nohtml");
$result = $db->sql_query("SELECT url from ".$prefix."_links_links where
url='$url'");
$numrows = $db->sql_numrows($result);
if ($numrows>0) {......

######################################################################
#Bug : http://site.com/modules.php?name=Web_Links&l_op=Add&url=sql Injection
######################################################################