First published: Fri May 01 2009(Updated: )
SQL injection vulnerability in the Sarkilar module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the id parameter in a showcontent action to modules.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP-Nuke | ||
phpnuke Sarkilar module |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2008-6779 is considered to be high due to its potential to allow execution of arbitrary SQL commands.
To fix CVE-2008-6779, it is recommended to update the Sarkilar module to the latest version that patches this SQL injection vulnerability.
CVE-2008-6779 could lead to unauthorized database access and data manipulation, compromising the security of your PHP-Nuke installation.
CVE-2008-6779 affects users of the Sarkilar module for PHP-Nuke that do not implement adequate security measures against SQL injection.
Yes, CVE-2008-6779 is exploitable remotely by attackers who can send crafted requests to the affected PHP-Nuke application.