ID

VAR-200612-0689


CVE

CVE-2006-6200


TITLE

PHP-Nuke News Module Index.PHP SQL Injection Vulnerability

Trust: 0.9

sources: BID: 21277 // CNNVD: CNNVD-200611-494

DESCRIPTION

Multiple SQL injection vulnerabilities in the (1) rate_article and (2) rate_complete functions in modules/News/index.php in the News module in Francisco Burzi PHP-Nuke 7.9 and earlier, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the sid parameter. The PHP-Nuke News module is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation. PHP-Nuke 7.9 and prior versions are vulnerable. ---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: PHP-Nuke "modules/News/index.php" SQL Injection Vulnerabilities SECUNIA ADVISORY ID: SA23128 VERIFY ADVISORY: http://secunia.com/advisories/23128/ CRITICAL: Moderately critical IMPACT: Manipulation of data, Exposure of sensitive information WHERE: >From remote SOFTWARE: PHP-Nuke 7.x http://secunia.com/product/2385/ DESCRIPTION: Paisterist has discovered two vulnerabilities in PHP-Nuke, which can be exploited by malicious people to conduct SQL injection attacks. Input passed to the "sid" parameter in modules/News/index.php from modules.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation allows retrieval of administrator usernames and password hashes, but requires that "magic_quotes_gpc" is disabled and that the attacker knows the prefix for the database tables. The vulnerabilities are confirmed in version 7.9. SOLUTION: Edit the source code to ensure that input is properly sanitised. Set "magic_quotes_gpc" in php.ini to On. Use another product. PROVIDED AND/OR DISCOVERED BY: Paisterist ORIGINAL ADVISORY: http://www.neosecurityteam.net/index.php?action=advisories&id=30 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2006-6200 // JVNDB: JVNDB-2006-001656 // BID: 21277 // VULHUB: VHN-22308 // PACKETSTORM: 52555

AFFECTED PRODUCTS

vendor:francisco burzimodel:php-nukescope:eqversion:7.7

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:7.0

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:7.4

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:7.1

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:7.0_final

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:7.6

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:7.5

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:7.8_patched_3.2

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:7.8

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:7.9

Trust: 1.6

vendor:francisco burzimodel:php-nukescope:eqversion:7.3

Trust: 1.0

vendor:francisco burzimodel:php-nukescope:eqversion:7.2

Trust: 1.0

vendor:francisco burzimodel:php-nukescope:lteversion:7.9

Trust: 0.8

vendor:php nukemodel:php-nukescope:eqversion:7.9

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:6.0

Trust: 0.3

vendor:franciscomodel:burzi php-nuke finalscope:eqversion:7.0

Trust: 0.3

vendor:php nukemodel:php-nukescope:eqversion:7.8

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:7.7

Trust: 0.3

vendor:php nukemodel:php-nukescope:eqversion:7.7

Trust: 0.3

vendor:php nukemodel:php-nukescope:eqversion:7.5

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:7.2

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:7.3

Trust: 0.3

vendor:php nukemodel:php-nukescope:eqversion:7.2

Trust: 0.3

vendor:php nukemodel:php-nukescope:eqversion:7.4

Trust: 0.3

vendor:php nukemodel:php-nukescope:eqversion:7.3

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:7.1

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:7.6

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:7.9

Trust: 0.3

vendor:php nukemodel:php-nukescope:eqversion:7.1

Trust: 0.3

vendor:php nukemodel:php-nukescope:eqversion:7.0

Trust: 0.3

vendor:franciscomodel:burzi php-nukescope:eqversion:7.8

Trust: 0.3

vendor:php nukemodel:php-nukescope:eqversion:7.6

Trust: 0.3

sources: BID: 21277 // JVNDB: JVNDB-2006-001656 // CNNVD: CNNVD-200611-494 // NVD: CVE-2006-6200

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-6200
value: HIGH

Trust: 1.0

NVD: CVE-2006-6200
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200611-494
value: HIGH

Trust: 0.6

VULHUB: VHN-22308
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-6200
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-22308
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-22308 // JVNDB: JVNDB-2006-001656 // CNNVD: CNNVD-200611-494 // NVD: CVE-2006-6200

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-6200

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200611-494

TYPE

sql injection

Trust: 0.7

sources: PACKETSTORM: 52555 // CNNVD: CNNVD-200611-494

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-001656

PATCH

title:Top Pageurl:http://phpnuke.org/

Trust: 0.8

sources: JVNDB: JVNDB-2006-001656

EXTERNAL IDS

db:NVDid:CVE-2006-6200

Trust: 2.8

db:BIDid:21277

Trust: 2.0

db:SECUNIAid:23128

Trust: 1.8

db:SECTRACKid:1017282

Trust: 1.7

db:VUPENid:ADV-2006-4739

Trust: 1.7

db:SREASONid:1935

Trust: 1.7

db:JVNDBid:JVNDB-2006-001656

Trust: 0.8

db:CNNVDid:CNNVD-200611-494

Trust: 0.7

db:BUGTRAQid:20061124 PHP-NUKE <= 7.9 NEWS MODULE "SID" SQL INJECTION VULNERABILITIES

Trust: 0.6

db:XFid:30525

Trust: 0.6

db:VULHUBid:VHN-22308

Trust: 0.1

db:PACKETSTORMid:52555

Trust: 0.1

sources: VULHUB: VHN-22308 // BID: 21277 // JVNDB: JVNDB-2006-001656 // PACKETSTORM: 52555 // CNNVD: CNNVD-200611-494 // NVD: CVE-2006-6200

REFERENCES

url:http://www.securityfocus.com/bid/21277

Trust: 1.7

url:http://securitytracker.com/id?1017282

Trust: 1.7

url:http://secunia.com/advisories/23128

Trust: 1.7

url:http://securityreason.com/securityalert/1935

Trust: 1.7

url:http://www.neosecurityteam.net/index.php?action=advisories&id=30

Trust: 1.7

url:http://www.securityfocus.com/archive/1/452553/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/4739

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/30525

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-6200

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-6200

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/30525

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/452553/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/4739

Trust: 0.6

url:http://www.phpnuke.org

Trust: 0.3

url:/archive/1/452553

Trust: 0.3

url:http://www.neosecurityteam.net/index.php?action=advisories&amp;id=30

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://corporate.secunia.com/products/48/?r=l

Trust: 0.1

url:http://secunia.com/product/2385/

Trust: 0.1

url:http://secunia.com/advisories/23128/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/15/?r=l

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-22308 // BID: 21277 // JVNDB: JVNDB-2006-001656 // PACKETSTORM: 52555 // CNNVD: CNNVD-200611-494 // NVD: CVE-2006-6200

CREDITS

Paisterist is credited with the discovery of this vulnerability.

Trust: 0.9

sources: BID: 21277 // CNNVD: CNNVD-200611-494

SOURCES

db:VULHUBid:VHN-22308
db:BIDid:21277
db:JVNDBid:JVNDB-2006-001656
db:PACKETSTORMid:52555
db:CNNVDid:CNNVD-200611-494
db:NVDid:CVE-2006-6200

LAST UPDATE DATE

2024-08-14T14:00:04.988000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-22308date:2018-10-17T00:00:00
db:BIDid:21277date:2008-01-23T16:38:00
db:JVNDBid:JVNDB-2006-001656date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200611-494date:2006-12-01T00:00:00
db:NVDid:CVE-2006-6200date:2018-10-17T21:47:12.390

SOURCES RELEASE DATE

db:VULHUBid:VHN-22308date:2006-12-01T00:00:00
db:BIDid:21277date:2006-11-24T00:00:00
db:JVNDBid:JVNDB-2006-001656date:2012-06-26T00:00:00
db:PACKETSTORMid:52555date:2006-11-29T15:21:40
db:CNNVDid:CNNVD-200611-494date:2006-11-30T00:00:00
db:NVDid:CVE-2006-6200date:2006-12-01T01:28:00