|
- Readme First! - Read and follow the rules, otherwise your posts will be closed |
|
|
|
|
|
There are currently, 151 guest(s) and 0 member(s) that are online.
You are Anonymous user. You can register for free by clicking here |
|
|
|
|
|
PHP-Nuke Script Insertion Vulnerabilities |
|
manunkind1 writes "Janek Vind "waraxe" has reported some vulnerabilities in PHP-Nuke, allowing malicious people to conduct script insertion attacks.
The problem is that certain parameters such as the "img" tags allow URLs to be specified. These URLs can contain references to administrative functions, which will be executed when an administrative user reads a forum posting or an u2u message with a malicious "img" tag.
An example has been published, which will add a new administrative user.
The vulnerabilities have been reported in version 7.10 and prior.
Solution:
A possible workaround is to change the URL for administrative functions to contain a secret and random path. Note this is imperfect and may be revealed using a similar technique.
Edit the source code to disallow the use of the "img" tag.
Use another product.
http://secunia.com/advisories/11195/
Admin Note: Discovered a while ago and has been fixed by both Zhen and a forum member."
|
|
Posted on Wednesday, March 24 @ 15:20:43 CET by Daniel-cmw |
|
|
|
|
| |
|
Average Score: 3 Votes: 2

|
|
|
|
|
|
| The comments are owned by the poster. We aren't responsible for their content. |
| | | | |
No Comments Allowed for Anonymous, please register | | | | |
Re: PHP-Nuke Script Insertion Vulnerabilities (Score: 1) by Johan1982 on Wednesday, March 24 @ 17:13:32 CET (User Info | Send a Message) | Specifically in where we can find fix? |
| | | | |
Re: PHP-Nuke Script Insertion Vulnerabilities (Score: 1) by Daniel-cmw on Wednesday, March 24 @ 17:25:46 CET (User Info | Send a Message) | http://www.nukecops.com/postlite25444-.html |
| | | | |
Re: PHP-Nuke Script Insertion Vulnerabilities (Score: 1) by chatserv on Thursday, March 25 @ 00:15:40 CET (User Info | Send a Message) http://nukeresources.com | This is not the same admin.php vulnerability, recently the img tag was removed from the disallowed tags in mainfile.php on versions 7.0, 7.1 and 7.2, i suggest re-adding it until code is added to validate the img tag.
in mainfile.php find:
(eregi("]*form*"?[^>]*>", $secvalue)) ||
under it add:
(eregi("]*img*"?[^>]*>", $secvalue)) || |
| | | | | |