FlatNuke < 2.5.6 Multiple Remote Vulnerabilities

high Nessus Plugin ID 19396

Synopsis

The remote web server contains a PHP application that is affected by multiple vulnerabilities.

Description

The remote host is running FlatNuke, a content management system written in PHP that uses flat files rather than a database for its storage.

The version of FlatNuke installed on the remote host suffers from several flaws:

- Arbitrary PHP Code Execution Vulnerability The application fails to remove newlines from a user's registration information and stores it as a PHP file with a known path. An attacker can leverage this flaw to execute arbitrary PHP code on the remote host subject to the privileges of the web server userid.

- Multiple Cross-Site Scripting Vulnerabilities Various scripts do not sanitize user-supplied input through several parameters before using it in dynamically generated pages, which can be exploited by attackers to launch cross-site scripting attacks against the affected application.

Solution

Upgrade to FlatNuke 2.5.6 or later.

See Also

https://seclists.org/bugtraq/2005/Aug/77

Plugin Details

Severity: High

ID: 19396

File Name: flatnuke_256.nasl

Version: 1.27

Type: remote

Family: CGI abuses

Published: 8/8/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:flatnuke:flatnuke

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 8/4/2005

Reference Information

CVE: CVE-2005-2537, CVE-2005-2538, CVE-2005-2539, CVE-2005-2540

BID: 14483, 14485

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990