First published: Fri Dec 01 2006(Updated: )
Multiple SQL injection vulnerabilities in the (1) rate_article and (2) rate_complete functions in modules/News/index.php in the News module in Francisco Burzi PHP-Nuke 7.9 and earlier, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the sid parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP-Nuke | =7.8_patched_3.2 | |
PHP-Nuke | =7.0 | |
PHP-Nuke | =7.4 | |
PHP-Nuke | =7.5 | |
PHP-Nuke | =7.2 | |
PHP-Nuke | =7.8 | |
PHP-Nuke | =7.0_final | |
PHP-Nuke | =7.3 | |
PHP-Nuke | =7.6 | |
PHP-Nuke | =7.9 | |
PHP-Nuke | =7.7 | |
PHP-Nuke | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6200 is considered a high-severity vulnerability due to its potential to allow execution of arbitrary SQL commands.
To fix CVE-2006-6200, upgrade to a patched version of PHP-Nuke where the SQL injection vulnerabilities have been resolved.
CVE-2006-6200 affects PHP-Nuke versions 7.9 and earlier.
Exploiting CVE-2006-6200 can allow remote attackers to manipulate the database, potentially compromising sensitive information.
Yes, CVE-2006-6200 affects systems when magic_quotes_gpc is disabled, increasing the risk of SQL injection.