An issue was discovered in flatCore before 2.0.0 build 139. A local file disclosure vulnerability was identified in the docs_file HTTP request body parameter for the acp interface. This can be exploited with admin access rights. The affected parameter (which retrieves the contents of the specified file) was found to be accepting malicious user input without proper sanitization, thus leading to retrieval of backend server sensitive files, e.g., /etc/passwd, SQLite database files, PHP source code, etc.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/160936/flatCore-CMS-XSS-File-Disclosure-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://github.com/flatCore/flatCore-CMS | Product Third Party Advisory |
https://sec-consult.com/vulnerability-lab/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-01-15 07:15
Updated : 2024-02-04 21:23
NVD link : CVE-2021-23835
Mitre link : CVE-2021-23835
CVE.ORG link : CVE-2021-23835
JSON object : View
Products Affected
flatcore
- flatcore
CWE
CWE-20
Improper Input Validation