lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20031008153738.18574.qmail@sf-www3-symnsj.securityfocus.com> Date: 8 Oct 2003 15:37:38 -0000 From: mod <rottyfig12@...mail.com> To: bugtraq@...urityfocus.com Subject: PHP-Nuke SQL Injection Version: PHP-Nuke 6.6 Language: PHP Web site: phpnuke.org Status: Vendor has been notified There's an SQL injection hole in modules.php. http://phpnuke.org/modules.php?name=Downloads&d_op=viewdownload&cid=59%20or%20cid=2 This is from not filtering 'cid', it should be checked that it is only numeric with is_numeric(). This hole could allow viewing of password hashes if the database is mysql 4.x. This may effect other versions.