Description
|
|
Multiple vulnerabilities were identified in FlatNuke, which may be exploited by remote attackers to compromise a vulnerable server, conduct cross site scripting attacks or cause a denial of service.
- The first flaw is due to an input validation error in the "Referer" HTTP header, which may be exploited by a remote attacker to execute arbitrary commands with the privileges of the web server.
- The second vulnerability is due to an input validation error in the "help.php" and "footer.php" files when handling a specially crafted "border" or "back" parameter, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
- The third issue is due to an infinite loop in the "foot_news.php" file when called directly via the browser, which may be exploited by attackers to cause a denial of service.
- The fourth flaw is due to an input validation error in the "thumb.php" file when handling a specially crafted "image" parameter, which may be exploited to conduct directory traversal attacks or to disclose the installation path.
|