vendor:
Flatnuke 3
by:
KiNgOfThEwOrLd
7.5
CVSS
HIGH
Remote Command Execution / Privilege Escalation
CWE
Product Name: Flatnuke 3
Affected Version From: Flatnuke 3
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
Flatnuke 3 Remote Command Execution / Privilege Escalation
Flatnuke doesn't use any database, so the registred users informations are located in a php file like /flatnuke3/misc/fndatabase/users/username.php . By the file manager module, the administrator, can upload, make, edit or delete some files, only while he's logging in. By the way, making a post whit the same request of that module, we can replace or edit a file, for example an user profile. So, there are a lot of way to exploit this vulnerability, we can edit the admin credentials, we can upload a malicious php script, and much more... But to exploit this vulnerability, we need to know the script path. We can get it generating a full path disclosure.
Mitigation:
Unknown