CVE-2008-4767 – PHP-Nuke DownloadsPlus Module - Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2008-4767
Unrestricted file upload vulnerability in the DownloadsPlus module in PHP-Nuke allows remote attackers to execute arbitrary code by uploading a file with (1) .htm, (2) .html, or (3) .txt extensions, then accessing it via a direct request to the file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: it is unclear how allowing the upload of .html or .txt files supports arbitrary code execution; this might be legitimate functionality. Vulnerabilidad de subida de fichero sin restricción en el módulo DownloadsPlus en PHP-Nuke, permite a atacantes remotos ejecutar código de su elección a través la subida de ficheros con la extensión (1) .htm, (2) .html, o (3) .txt y después accediendo a ellos mediante una petición directa al archivo. NOTA: el origen de esta información es desconocido. • https://www.exploit-db.com/exploits/31702 http://www.juniper.net/security/auto/vulnerabilities/vuln28919.html http://www.securityfocus.com/bid/28919 https://exchange.xforce.ibmcloud.com/vulnerabilities/42007 • CWE-20: Improper Input Validation •
CVE-2008-3573 – Pligg CMS 9.9.5 - 'CAPTCHA' Registration Automation Security Bypass
https://notcve.org/view.php?id=CVE-2008-3573
The CAPTCHA implementation in (1) Pligg 9.9.5 and possibly (2) Francisco Burzi PHP-Nuke 8.1 provides a critical random number (the ts_random value) within the URL in the SRC attribute of an IMG element, which allows remote attackers to pass the CAPTCHA test via a calculation that combines this value with the current date and the HTTP User-Agent string. La implementación CAPTCHA en (1) Pligg 9.9.5 y posiblemente (2) Francisco Burzi PHP-Nuke 8.1, proporciona un número aleatorio crítico (el valor del ts_random) dentro de la URL en el traibuto SRC de un elemento IMG, lo que permite a atacantes remotos evitar el test CAPTCHA mediante un cálculo que combina ese valor con la fecha actual y la cadena HTTP del User-Agent. • https://www.exploit-db.com/exploits/32142 http://www.rooksecurity.com/blog/?p=17 http://www.securityfocus.com/bid/30518 https://exchange.xforce.ibmcloud.com/vulnerabilities/44192 • CWE-189: Numeric Errors CWE-264: Permissions, Privileges, and Access Controls •
CVE-2008-3512 – PHP-Nuke Kleinanzeigen Module - 'lid' SQL Injection
https://notcve.org/view.php?id=CVE-2008-3512
SQL injection vulnerability in the Kleinanzeigen module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the lid parameter in a visit action to modules.php. Vulnerabilidad de inyección SQL en el módulo Kleinanzeigen para PHP-Nuke permite a atacantes remotos ejecutar comandos SQL arbitrariamente a través del parámetro lid de una acción visit en modules.php • https://www.exploit-db.com/exploits/32191 http://www.securityfocus.com/archive/1/495166/100/0/threaded http://www.securityfocus.com/bid/30577 https://exchange.xforce.ibmcloud.com/vulnerabilities/44255 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2008-3513 – PHP-Nuke Book Catalog Module 1.0 - 'catid' SQL Injection
https://notcve.org/view.php?id=CVE-2008-3513
SQL injection vulnerability in the Book Catalog module 1.0 for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the catid parameter in a category action to modules.php. Una vulnerabilidad de inyección SQL en el módulo Book Catalog versión 1.0 para PHP-Nuke, permite a los atacantes remotos ejecutar comandos SQL arbitrarios por medio del parámetro catid en una acción category en el archivo modules.php. • https://www.exploit-db.com/exploits/32140 http://packetstorm.linuxsecurity.com/0810-exploits/phpnukebook-sql.txt http://secunia.com/advisories/32500 http://www.securityfocus.com/archive/1/497929/100/0/threaded http://www.securityfocus.com/bid/30511 http://www.securityfocus.com/bid/30511/exploit https://exchange.xforce.ibmcloud.com/vulnerabilities/44434 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2008-1315 – PHP-Nuke zClassifieds Module - 'cat' SQL Injection
https://notcve.org/view.php?id=CVE-2008-1315
SQL injection vulnerability in the ZClassifieds module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the cat parameter to modules.php. Vulnerabilidad de inyección SQL en el módulo ZClassifieds para PHP-Nuke permite a atacantes remotos ejecutar comandos SQL de su elección mediante el parámetro cat de modules.php. • https://www.exploit-db.com/exploits/31384 http://securityreason.com/securityalert/3736 http://www.rbt-4.net/forum/viewthread.php?forum_id=51&thread_id=3109 http://www.securityfocus.com/archive/1/489416/100/0/threaded http://www.securityfocus.com/bid/28211 https://exchange.xforce.ibmcloud.com/vulnerabilities/41149 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •