Vulnerabilities > CVE-2005-2813 - Directory Traversal vulnerability in Flatnuke 2.5.6
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
PARTIAL Availability impact
NONE Summary
Directory traversal vulnerability in FlatNuke 2.5.6 and possibly earlier allows remote attackers to read arbitrary files via ".." sequences and "%00" (trailing null byte) characters in the id parameter to the read mod in index.php.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | FlatNuke 2.5.6 ID Parameter Directory Traversal Vulnerability. CVE-2005-2813 . Webapps exploit for php platform |
id | EDB-ID:26212 |
last seen | 2016-02-03 |
modified | 2005-08-31 |
published | 2005-08-31 |
reporter | rgod |
source | https://www.exploit-db.com/download/26212/ |
title | FlatNuke 2.5.6 ID Parameter Directory Traversal Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | FLATNUKE_ID_DIR_TRAVERSAL.NASL |
description | The remote host is running FlatNuke, a content management system written in PHP and using flat files rather than a database for its storage. The version of FlatNuke installed on the remote host suffers fails to remove directory traversal sequences user input to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20293 |
published | 2005-12-12 |
reporter | This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/20293 |
title | FlatNuke index.php id Parameter Traversal Arbitrary File Access |
code |
|
References
- http://seclists.org/lists/bugtraq/2005/Aug/0440.html
- http://secunia.com/advisories/16650/
- http://securitytracker.com/id?1014824
- http://securitytracker.com/id?1015339
- http://www.securityfocus.com/archive/1/419107/100/0/threaded
- http://www.securityfocus.com/bid/14702
- http://www.securityfocus.com/bid/15796