************************************************************** * CODEBUG Labs * Advisory #5 * Title: Newsletter Injection Bug * Author: Pierquinto 'Mantra' Manco * Product: PHP-Nuke 7.4 * Type: XSS * Web: http://www.mantralab.org * ************************************************************** Newsletter Injection Bug - ) Description PHP-Nuke is a very bugged web CMS, version 7.4 has critical XSS bug that permit to an attacker to post message in system newsletter. We can bypass the official php-nuke patch sending data by POST instead of GET. - ) Proof-of-Concept Create a HTML file with this lines:
- ) Patch Apply this code to your admin.php file: if ( !empty($HTTP_GET_VARS['admin']) ) { die("Shit! Mantra wins =)"); } if ( !empty($HTTP_POST_VARS['admin']) ) { die("Shit! Mantra wins =)"); } -) Note Previous patch isn't enough performant. Try this one. There are a lot of this problem in PHP-Nuke 7.4, my patch will check the content of $_POST[admin] and $_GET[admin]. I'm going to post all this vulnerabilities on my site... http://www.mantralab.org ************************************************************** http://www.mantralab.org **************************************************************