Direct code injection vulnerability in FlatNuke 2.5.3 allows remote attackers to execute arbitrary PHP code by placing the code into the Referer header of an HTTP request, which causes the code to be injected into referer.php, which can then be accessed by the attacker.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://securitytracker.com/id?1014114 | patch exploit vdb entry third party advisory broken link |
http://secunia.com/advisories/15603 | broken link third party advisory patch vendor advisory |
http://secwatch.org/advisories/secwatch/20050604_flatnuke.txt | patch vendor advisory exploit broken link |
http://www.vupen.com/english/advisories/2005/0697 | vdb entry broken link |
http://flatnuke.sourceforge.net/index.php?mod=read&id=1117979256 | patch product |