Vulnerability Note VU#933955

PHPNuke 'admin.php' script does not adequately authenticate users, thereby allowing malicious user to copy, move, or upload files

Original Release date: 24 Sep 2002 | Last revised: 24 Sep 2002


PHPNuke's "admin.php" script does not properly authenticate users of its filemanager capabilities. Attackers may exploit this vulnerability to copy, move, or upload files.


PHPNuke is a set of PHP scripts designed to simplify website creation and maintenance. The "admin.php" script of PHPNuke includes "filemanager" capabilities allowing an administrative user to copy and move files on the server and to upload new files to the server.

However, this script does not properly verify user authentication. Therefore, any remote attacker can access the filemanager capabilities with PHPNuke administrator privileges.


Remote attackers can copy and move files on the server and upload new files, potentially overwriting existing files.


The CERT/CC is currently unaware of a practical solution to this problem.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
PHP-NukeAffected-18 Sep 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to supergate for reporting this vulnerability.

This document was written by Shawn Van Ittersum.

Other Information

  • CVE IDs: Unknown
  • Date Public: 24 Sep 2001
  • Date First Published: 24 Sep 2002
  • Date Last Updated: 24 Sep 2002
  • Severity Metric: 4.28
  • Document Revision: 9


If you have feedback, comments, or additional information about this vulnerability, please send us email.