7.5
CVSSv2

CVE-2007-1493

Published: 16/03/2007 Updated: 16/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

nukesentinel.php in NukeSentinel 2.5.06 and previous versions uses a permissive regular expression to validate an IP address, which allows remote malicious users to execute arbitrary SQL commands via the Client-IP HTTP header, due to an incomplete patch for CVE-2007-1172.

Vulnerable Product Search on Vulmon Subscribe to Product

nukescripts nukesentinel

Exploits

#!/usr/bin/php <?php error_reporting(E_ALL ^ E_NOTICE); # Module's Description: # Advanced site security proudly produced by: NukeScripts Network, Raven PHPScripts, & NukeResources # IS IT A JOKE ?! # # SQL Injection --> File Disclosure # Maybe work on other versions # Interesting exploit =) # if($argc < 5) { print(" NukeSenti ...
#!/usr/bin/php <?php error_reporting(E_ALL ^ E_NOTICE); if($argc < 3) { print(" -- NukeSentinel <= 2506 SQL Injection (mysql >= 4024) Exploit --- ----------------------------------------------------------------------- PHP conditions: none CMS conditions: disable_switch<=0 (module activated), track_active=1 Credits: Dark ...