Jump to content
TCH-Thomas

Postnuke Multiple Vulnerabilities

Recommended Posts

Secunia writes:

Description:

Maksymilian Arciemowicz has reported multiple vulnerabilities in PostNuke, allowing malicious people to conduct cross-site scripting and SQL injection attacks.

 

1) Input passed to the "catid" parameter in "modules/News/funcs.php", and the "show" parameter in "modules/Downloads/dl-search.php" isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

 

Examples:

index.php?catid='

modules.php?op=modload&name=News&file=article&sid=1&catid='[sql]

admin.php?module=NS-AddStory&op=EditCategory&catid='[sql]

index.php?name=Downloads&req=search&query=&show=[sql]

 

2) Input passed to various parameters in the "Downloads" module isn't properly sanitised before being used. This can be exploited to inject arbitrary HTML and script code, which will get executed in an administrators browser session in context of an affected site when the administrator view new downloads.

 

The vulnerabilities affect version .750 to .760RC2.

 

[b]Solution:[/b]

Apply updated packages:

http://news.postnuke.com/Article2669.html

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...