Flatnux-2009-01-27 RFI
Flatnux is vulnerable to Remote File Inclusion (RFI) due to the lack of input validation in the include/theme.php and flatnux.php files. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. The malicious URL contains the malicious code which will be executed on the vulnerable application. The malicious code can be sent to the vulnerable application via the _FNROOTPATH parameter in the URL. The malicious code can be sent to the vulnerable application via the _FNROOTPATH parameter in the URL. The malicious code can be sent to the vulnerable application via the _FNROOTPATH parameter in the URL. The malicious code can be sent to the vulnerable application via the _FNROOTPATH parameter in the URL. The malicious code can be sent to the vulnerable application via the _FNROOTPATH parameter in the URL. The malicious code can be sent to the vulnerable application via the _FNROOTPATH parameter in the URL. The malicious code can be sent to the vulnerable application via the _FNROOTPATH parameter in the URL.