Contributed by CVE Reference:
Less critical Manipulation of data SQL Injection Vulnerability (when logged in as user with administrative privilages) Omid (omid hackers ir) Users should immediately update to 0.763. PostNuke versions 0.763 and later are unaffected. Download this release for new full installations. Download (ZIP) Download (TAR.GZ) Only download the patched files release if you are running a pre-existing 0.762 installation. Download (ZIP) Download (TGZ) Simon Birtwistle [HammerHead]Severity
Impact
Vulnerabilities
Credits
Solution
PostNuke 0.763 Full Release Download
MD5: 13221d427059388d509176c2de77b2b1
SHA-1: d850f06e8632814faa6b1268cc2a787a50aa7cf3
MD5: 861fb337832cc86c2ac60ba0ed9de353
SHA-1: f4ba3e9e100229cd096ed1cd695f086dae46eccc
PostNuke 0.763 Patch Files Download
This patch will not work with new installations or successfully patch versions earlier than 0.762.
MD5: e81a251b952757ec919e00589fedf0c6
SHA-1: 65d7fb1e76ce1b38f82f78de2c10543c547d3019
MD5: bfa3f432800de453653748adc2df412e
SHA-1: a77bb37b7cc4b4e6831bdf510ade915536645a59
PostNuke CMS Steering Committee