vendor:
FlatCMS
by:
cijfer
7,5
CVSS
HIGH
Remote Command Execution
78
CWE
Product Name: FlatCMS
Affected Version From: 1.01
Affected Version To: 1.01
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005
FlatCMS <=1.01 Remote Command Execution Exploit
An input validation flaw exists within 'admin/file_editor.php' of FlatCMS which can lead to remote command execution. The problem is that the $save_file variable is not properly sanitized, allowing an attacker to inject malicious code into the $f_content variable, which is then written to the $save_file file. This can be exploited to execute arbitrary commands on the remote system.
Mitigation:
Ensure that user input is properly sanitized and validated before being used.