lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8654C851B1DAFA4FA18A9F150145F92505074020@FNEX01.fishnetsecurity.com>
Date: Tue, 23 May 2006 14:03:57 -0500
From: "Evans, Arian" <Arian.Evans@...hnetsecurity.com>
To: "security curmudgeon" <jericho@...rition.org>,
	<Mster-X@...mail.com>, <bugtraq@...urityfocus.com>
Subject: RE: modules name(Sections)SQL Injection Exploit


That looks a lot like a *nuke (PHPNuke & forks like PostNuke).

The "thold" param has a history of issues, XSS and the like, and
I seem to recall it is handled by the "Sections" module in Nuke.

If it's the code I think it is, there are more issues with other
params which are even listed in the example below.

(Hint: the op param)

Cheers,

Arian J. Evans
FishNet Security
913.710.7085 [mobile]
816.701.2045 [office]


 


 

> -----Original Message-----
> From: security curmudgeon [mailto:jericho@...rition.org] 
> Sent: Sunday, May 21, 2006 8:43 PM
> To: Mster-X@...mail.com
> Cc: bugtraq@...urityfocus.com
> Subject: Re: modules name(Sections)SQL Injection Exploit
> 
> 
> : ********************
> : By: Mr-X
> : Email: Mster-X@...mail.com
> : Subject: modules name(Sections)SQL Injection 
> : ********************
> : 
> : example:-
> : 
> /modules.php?name=Surveys&op=results&pollID=8&mode=&order=&thold=[SQL]
> 
> What product is this in? Searching for "modules name 
> sections" is not that 
> helpful.
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ