Re: PHP-Nuke SQL Injection Vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



David Endler wrote:
> If the attacker's UID is 2, he or she can then launch the attack by
> requesting the following URL:
>
> modules.php?name=Your_Account&op=saveuser&uid=2&bio=%5c&EditedMessage=
> no&pass=xxxxx&vpass=xxxxx&newsletter=,+bio=0,+pass=md5(1)/*
> [...]
>   +--[ bio          = '\',

Well, this is impossible if "magic_quotes_gpc" is ON, because %5c will be 
passed as \\ , not as \ .
Then we have:
bio          = '\\',
and SQL injection is apsoluty impossible.

I really don't know why PHP-Nuke not check magic_quotes.

In my PHP engine first task is checking 'magic_quotes', and if it is OFF, then 
simply turn it ON:
if (get_magic_quotes_gpc()==0) set_magic_quotes_runtime (1);

This line should be at the top of init script of every PHP engine.

P.S. 'magic_quotes' is by default ON on many web-hosting servers, so I think 
that this vulnerability will not affect all sites with PHP nuke.
...except if PHP Nuke explicitly turn magic_quotes off ?!?

Regards,
Predrag Damnjanovic


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux