First published: Thu Oct 26 2006(Updated: )
Incomplete blacklist vulnerability in mainfile.php in PHP-Nuke 7.9 and earlier allows remote attackers to conduct SQL injection attacks via (1) "/**/UNION " or (2) " UNION/**/" sequences, which are not rejected by the protection mechanism, as demonstrated by a SQL injection via the eid parameter in a search action in the Encyclopedia module in modules.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP-Nuke | =7.3 | |
PHP-Nuke | =7.4 | |
PHP-Nuke | =7.1 | |
PHP-Nuke | <=7.9 | |
PHP-Nuke | =7.5 | |
PHP-Nuke | =7.2 | |
PHP-Nuke | =7.7 | |
PHP-Nuke | =7.8 | |
PHP-Nuke | =7.0 | |
PHP-Nuke | =7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5525 has a medium severity rating due to its potential to allow SQL injection attacks.
To fix CVE-2006-5525, upgrade to a version of PHP-Nuke that is later than 7.9, which includes patched code to address the vulnerability.
CVE-2006-5525 affects PHP-Nuke versions 7.0 to 7.9.
CVE-2006-5525 allows remote attackers to conduct SQL injection attacks using specific UNION-based sequences.
Yes, CVE-2006-5525 can be easily exploited by an attacker familiar with SQL injection techniques.