ID

VAR-200412-0577


CVE

CVE-2004-2293


TITLE

PHP-Nuke Multiple Input Validation Vulnerabilities

Trust: 0.9

sources: BID: 10524 // CNNVD: CNNVD-200412-416

DESCRIPTION

Multiple cross-site scripting (XSS) vulnerabilities in PHP-Nuke 6.0 to 7.3 allow remote attackers to inject arbitrary web script or HTML via the (1) eid parameter or (2) query parameter to the Encyclopedia module, (3) preview_review function in the Reviews module as demonstrated by the url, cover, rlanguage, and hits parameters, or (4) savecomment function in the Reviews module, as demonstrated using the uname parameter. NOTE: the Faq/categories and Encyclopedia/ltr issues are already covered by CVE-2005-1023. PHP-Nuke is prone to multiple vulnerabilities. The issues result from insufficient sanitization of user-supplied data. The following specific issues can affect the application: PHP-Nuke is prone to multiple cross-site scripting vulnerabilities. These issues affect the 'Faq', 'Encyclopedia' and 'Reviews' modules. These cross-site scripting issues could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If a user follows the malicious link, the attacker-supplied code executes in the Web browser of the victim computer. PHP-Nuke is prone to an SQL Injection Vulnerability. Again the issue is due to a failure of the application to properly sanitize user-supplied input. The problem presents itself when SQL syntax is passed through the a parameter of the 'Reviews' module. As a result of this issue an attacker could modify the logic and structure of database queries. Finally a remote denial of service vulnerability is reported to exist in the score subsystem of the 'Review' module of PHP-Nuke, it is reported that a large number supplied as a value for a parameter passed to the 'Reviews' module will deny service to legitimate PHP-Nuke users

Trust: 1.35

sources: NVD: CVE-2004-2293 // BID: 10524 // VULHUB: VHN-10721 // VULMON: CVE-2004-2293

AFFECTED PRODUCTS

vendor:francisco burzimodel:php-nukescope:eqversion:6.7

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:6.9

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:6.0

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:6.6

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:6.5_rc2

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:6.5_rc3

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:6.5_rc1

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:6.5

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:6.5_beta1

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:6.5_final

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:7.1

Trust: 1.0

vendor:francisco burzimodel:php-nukescope:eqversion:7.3

Trust: 1.0

vendor:francisco burzimodel:php-nukescope:eqversion:7.2

Trust: 1.0

vendor:francisco burzimodel:php-nukescope:eqversion:7.0_final

Trust: 1.0

vendor:francisco burzimodel:php-nukescope:eqversion:7.0

Trust: 1.0

vendor:franciscomodel:burzi php-nukescope:eqversion:7.3

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:7.2

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:7.1

Trust: 0.3

vendor:franciscomodel:burzi php-nuke finalscope:eqversion:7.0

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:7.0

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:6.9

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:6.7

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:6.6

Trust: 0.3

vendor:franciscomodel:burzi php-nuke rc3scope:eqversion:6.5

Trust: 0.3

vendor:franciscomodel:burzi php-nuke rc2scope:eqversion:6.5

Trust: 0.3

vendor:franciscomodel:burzi php-nuke rc1scope:eqversion:6.5

Trust: 0.3

vendor:franciscomodel:burzi php-nuke finalscope:eqversion:6.5

Trust: 0.3

vendor:franciscomodel:burzi php-nuke betascope:eqversion:6.51

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:6.5

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:6.0

Trust: 0.3

sources: BID: 10524 // CNNVD: CNNVD-200412-416 // NVD: CVE-2004-2293

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-2293
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200412-416
value: MEDIUM

Trust: 0.6

VULHUB: VHN-10721
value: MEDIUM

Trust: 0.1

VULMON: CVE-2004-2293
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2004-2293
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-10721
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-10721 // VULMON: CVE-2004-2293 // CNNVD: CNNVD-200412-416 // NVD: CVE-2004-2293

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2004-2293

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200412-416

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-200412-416

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-10721 // VULMON: CVE-2004-2293

EXTERNAL IDS

db:BIDid:10524

Trust: 2.1

db:OSVDBid:6997

Trust: 1.8

db:OSVDBid:6998

Trust: 1.8

db:OSVDBid:6999

Trust: 1.8

db:SECUNIAid:11852

Trust: 1.8

db:NVDid:CVE-2004-2293

Trust: 1.8

db:CNNVDid:CNNVD-200412-416

Trust: 0.7

db:BUGTRAQid:20040611 [WARAXE-2004-SA#032 - MULTIPLE SECURITY FLAWS IN PHPNUKE 6.X - 7.3]

Trust: 0.6

db:XFid:16406

Trust: 0.6

db:EXPLOIT-DBid:24191

Trust: 0.2

db:SEEBUGid:SSVID-77924

Trust: 0.1

db:VULHUBid:VHN-10721

Trust: 0.1

db:VULMONid:CVE-2004-2293

Trust: 0.1

sources: VULHUB: VHN-10721 // VULMON: CVE-2004-2293 // BID: 10524 // CNNVD: CNNVD-200412-416 // NVD: CVE-2004-2293

REFERENCES

url:http://www.securityfocus.com/bid/10524

Trust: 1.8

url:http://www.securityfocus.com/archive/1/365865

Trust: 1.8

url:http://www.osvdb.org/6997

Trust: 1.8

url:http://www.osvdb.org/6998

Trust: 1.8

url:http://www.osvdb.org/6999

Trust: 1.8

url:http://secunia.com/advisories/11852

Trust: 1.8

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/16406

Trust: 1.2

url:http://xforce.iss.net/xforce/xfdb/16406

Trust: 0.6

url:http://www.irannuke.com/

Trust: 0.3

url:/archive/1/365865

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/24191/

Trust: 0.1

sources: VULHUB: VHN-10721 // VULMON: CVE-2004-2293 // BID: 10524 // CNNVD: CNNVD-200412-416 // NVD: CVE-2004-2293

CREDITS

Discovery of these vulnerabilities is credited to Janek Vind <come2waraxe@yahoo.com>.

Trust: 0.9

sources: BID: 10524 // CNNVD: CNNVD-200412-416

SOURCES

db:VULHUBid:VHN-10721
db:VULMONid:CVE-2004-2293
db:BIDid:10524
db:CNNVDid:CNNVD-200412-416
db:NVDid:CVE-2004-2293

LAST UPDATE DATE

2024-08-14T14:48:10.059000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-10721date:2017-07-11T00:00:00
db:VULMONid:CVE-2004-2293date:2017-07-11T00:00:00
db:BIDid:10524date:2004-06-11T00:00:00
db:CNNVDid:CNNVD-200412-416date:2005-10-25T00:00:00
db:NVDid:CVE-2004-2293date:2017-07-11T01:31:46.327

SOURCES RELEASE DATE

db:VULHUBid:VHN-10721date:2004-12-31T00:00:00
db:VULMONid:CVE-2004-2293date:2004-12-31T00:00:00
db:BIDid:10524date:2004-06-11T00:00:00
db:CNNVDid:CNNVD-200412-416date:2004-12-31T00:00:00
db:NVDid:CVE-2004-2293date:2004-12-31T05:00:00