[For those still using PHP-Nuke: please upgrade whenever the authors bring out a new version -- Raju]
This is an RFC 1153 digest. (1 message) ---------------------------------------------------------------------- Message-ID: <004301c26426$c845fd00$856816d5@netropolis> From: "Pedro Inacio" <[EMAIL PROTECTED]> Sender: [EMAIL PROTECTED] To: <[EMAIL PROTECTED]> Subject: [Full-Disclosure] PHP-Nuke x.x SQL Injection Date: Wed, 25 Sep 2002 01:02:04 +0100 Hello, All PHP-Nuke versions, including the just released 6.0, are vulnerable to a very simple SQL injection that may lead to a basic DoS attack. For instance, if you create a short script, to send a few requests, (I have tested with just 6) similar to this: http://www.nukesite.com/modules.php?name=News&file=article&sid=1234%20or%201 =1 after a real short time the load of the machine is so high that it will become inacessible. When the script is stopped, the server will take a few minutes to recover from the load and become acessible again. Well, the number of requests depends on your MySQL parameters and hardware, but in general all the tested php-nuke sites where vulnerable and become inacessible. If you are running PHP-Nuke, I suggest the creation of some filters to avoid this kind of attack. Other things can be made, but I will not talk about them now. I will wait until Francisco fix them. Francisco was noticed a month ago, but the problems persist. Cheers, Pedro Inacio _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html ------------------------------ End of this Digest ****************** -- Raju Mathur [EMAIL PROTECTED] http://kandalaya.org/ It is the mind that moves ================================================ To unsubscribe, send email to [EMAIL PROTECTED] with unsubscribe in subject header. Check archives at http://www.mail-archive.com/ilugd%40wpaa.org
