Secunia Security Advisory - Pierquinto Manco has reported a vulnerability in FlatNuke, which can be exploited by malicious people to compromise a vulnerable system.
ba8b84fe43e98e20552a5040815d2789ab738d2c046f294e7059f6a873f0b74b
TITLE:
FlatNuke PHP Script Creation Vulnerability
SECUNIA ADVISORY ID:
SA13709
VERIFY ADVISORY:
http://secunia.com/advisories/13709/
CRITICAL:
Highly critical
IMPACT:
Manipulation of data, System access
WHERE:
>From remote
SOFTWARE:
FlatNuke 2.x
http://secunia.com/product/4477/
DESCRIPTION:
Pierquinto "Mantra" Manco has reported a vulnerability in FlatNuke,
which can be exploited by malicious people to compromise a vulnerable
system.
Input passed to various parameters in "forum/index.php" is not
properly sanitised before being used to create a PHP script. This can
be exploited to execute arbitrary PHP script code by adding a new line
to the beginning of e.g. the "url_avatar" parameter.
The vulnerability has been reported in version 2.5.1. Other versions
may also be affected.
SOLUTION:
Update to version 2.5.2.
http://sourceforge.net/project/showfiles.php?group_id=93076
PROVIDED AND/OR DISCOVERED BY:
Pierquinto "Mantra" Manco
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------