First published: Mon Mar 31 2008(Updated: )
The pnVarPrepForStore function in PostNuke 0.764 and earlier skips input sanitization when magic_quotes_runtime is enabled, which allows remote attackers to conduct SQL injection attacks and execute arbitrary SQL commands via input associated with server variables, as demonstrated by the CLIENT_IP HTTP header (HTTP_CLIENT_IP variable).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postnuke Software Foundation Pnphpbb | <=0.764 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1591 involves the pnVarPrepForStore function in PostNuke 0.764 and earlier, which lacks input sanitization with magic_quotes_runtime enabled, allowing SQL injection attacks.
The potential risks of CVE-2008-1591 include unauthorized execution of arbitrary SQL commands and exposure of sensitive data.
To fix CVE-2008-1591, upgrade to a version of PostNuke that is newer than 0.764 where the vulnerability is patched.
CVE-2008-1591 affects PostNuke 0.764 and earlier versions.
Protect your system from CVE-2008-1591 by disabling magic_quotes_runtime and implementing comprehensive input validation and sanitization.