First published: Fri Dec 31 2004(Updated: )
SQL injection vulnerability in 4nGuestbook 0.92 for PHP-Nuke 6.5 through 6.9 allows remote attackers to modify SQL statements via the entry parameter to modules.php, which can also facilitate cross-site scripting (XSS) attacks when MySQL errors are triggered.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP-Nuke | =6.5_beta1 | |
PHP-Nuke | =6.5 | |
Warpspeed 4nGuestbook | =0.92 | |
PHP-Nuke | =6.5_rc2 | |
PHP-Nuke | =6.5_rc3 | |
PHP-Nuke | =6.5_final | |
PHP-Nuke | =6.7 | |
PHP-Nuke | =6.6 | |
PHP-Nuke | =6.9 | |
PHP-Nuke | =6.5_rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2354 is considered to have a high severity due to its potential for remote SQL injection and XSS attacks.
To fix CVE-2004-2354, upgrade to a patched version of 4nGuestbook or implement input validation to prevent SQL injection.
The affected software versions include PHP-Nuke 6.5 through 6.9 and 4nGuestbook 0.92.
CVE-2004-2354 can facilitate SQL injection attacks and cross-site scripting (XSS) attacks.
Mitigating the risks of CVE-2004-2354 involves ensuring proper user input sanitization and using updated software versions.