Korean
<< Back
VID 21793
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The FlatNuke program is vulnerable to a directory traversal vulnerability via the id parameter of the read module. FlatNuke is a CMS (Content Management System) written in PHP that is based entirely on plain text files rather than a database. FlatNuke version 2.5.6 and possibly other versions allow a remote attacker to traverse directories and view files residing outside of the Web root, caused by improper validation of user-supplied input passed to the 'id' parameter of the 'index.php' script. By sending a specially-crafted URL containing "dot dot" sequences (../) and null byte (%00), a remote attacker could read arbitrary files outside of the web root directory with the privileges of the Web service.

* References:
http://rgod.altervista.org/flatnuke256_xpl.html
http://www.securityfocus.com/archive/1/archive/1/419107/100/0/threaded
http://securitytracker.com/alerts/2005/Dec/1015339.html

* Platforms Affected:
FlatNuke SourceForge Project, FlatNuke version 2.5.6 and possibly other versions
Any operating system Any version
Recommendation No upgrade or patch available as of December 2005.

Upgrade to the latest version of FlatNuke (2.5.7 or later), when new fixed version becomes available from the SourceForge.net Web site at http://prdownloads.sourceforge.net/flatnuke/

As a workaround, enable PHP's 'magic_quotes_gpc' setting.
Related URL CVE-2005-4208 (CVE)
Related URL 15796 (SecurityFocus)
Related URL (ISS)