S-213: Nukedit 'email' Parameter Vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-213: Nukedit 'email' Parameter Vulnerability
# 1  
Old 02-27-2008
S-213: Nukedit 'email' Parameter Vulnerability

Nukedit is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. The risk is LOW. Exlploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

XSS vulnerability found via injection in the parameter address

Mods please move if posted in wrong section, I wasnt sure where to ask this one. There are several of us that use an open source program called yiimp, https://github.com/tpruvot/yiimp several of our sites were attacked last night and I am reaching out to you guys to see if then vulnerability... (0 Replies)
Discussion started by: crombiecrunch
0 Replies

2. Shell Programming and Scripting

how do I make dynamic parameter names? Or get the value of a parameter evaluated twi

Say I write something like the following: var1=1 var2=2 for int in 1 2 do echo "\$var$int" done I want the output to be: 1 2 Instead I get something like: $var1 $var2 (2 Replies)
Discussion started by: Awanka
2 Replies
Login or Register to Ask a Question
THEMOLE(1)						      General Commands Manual							THEMOLE(1)

NAME
themole - automatic SQL injection exploitation tool SYNOPSIS
themole [ -h ] [ -u url ] [ -n needle ] [-t num_threads] DESCRIPTION
The Mole is a command line interface SQL Injection exploitation tool. This application is able to exploit both union-based and blind bool- ean-based injections. Every action The Mole can execute is triggered by a specific command. All this application requires in order to exploit a SQL Injection is the URL(including the parameters) and a needle(a string) that appears in the server's response whenever the injection parameter generates a valid query, and does not appear otherwise. OPTIONS
-h Shows the help message and exits. -u url Sets the url of the mole's instance to url. -n needle Sets the needle of the mole's instance to needle. It must be a string that appears when the injection returns true and disappears when the injection is false. -t threads Sets the max number of concurrent requests that the mole will be making. Cannot be changed at runtime. SEE ALSO
The program provides interactive documentation, refer also to the official README file. AUTHOR
This manual page was written by Santiago Alessandri <salessandri@nasel.com.ar> November 24 2011 THEMOLE(1)