--------------------------------------------------------------- ____ __________ __ ____ __ /_ | ____ |__\_____ \ _____/ |_ /_ |/ |_ | |/ \ | | _(__ <_/ ___\ __\ ______ | \ __\ | | | \ | |/ \ \___| | /_____/ | || | |___|___| /\__| /______ /\___ >__| |___||__| \/\______| \/ \/ --------------------------------------------------------------- Http://www.inj3ct-it.org Staff[at]inj3ct-it[dot]org --------------------------------------------------------------- Flatnuke 3 Remote Command Execution / Privilege Escalation --------------------------------------------------------------- #By KiNgOfThEwOrLd --------------------------------------------------------------- Corrupted Module: File Manager --------------------------------------------------------------- PoC: Flatnuke doesn't use any database, so the registred users informations are located in a php file like /flatnuke3/misc/fndatabase/users/username.php . By the file manager module, the administrator, can upload, make, edit or delete some files, only while he's logging in. By the way, making a post whit the same request of that module, we can replace or edit a file, for example an user profile. So, there are a lot of way to exploit this vulnerability, we can edit the admin credentials, we can upload a malicious php script, and much more... But to exploit this vulnerability, we need to know the script path. We can get it generating a full path disclosure. --------------------------------------------------------------- Full Path Disclosure Example: http://[target]/[flatnuke3_path]/index.php?mod=[forum_path]&op=disc&argumentname=[a_casual_char] --------------------------------------------------------------- File Replace Exploit: