5
CVSSv2

CVE-2005-4208

Published: 13/12/2005 Updated: 19/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 510
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in Flatnuke 2.5.6 allows remote malicious users to access arbitrary files via a .. (dot dot) and null byte (%00) in the id parameter of the read module.

Vulnerable Product Search on Vulmon Subscribe to Product

flatnuke flatnuke 2.5.6

Exploits

<?php /* Aug 2005, 4th Flatnuke 255 (possibly prior versions) remote code execution by rgod site: rgodaltervistaorg thanks to UlisseHacker :) make these changes in phpini if you have troubles with this script: allow_call_time_pass_reference = on register_globals = on */ error_reporting(0); in ...
<?php # ---flatnuke_256_xplphp 432 10/12/2005 # # Flatnuke 256 privilege escalation / remote commands execution exploit # (works with magic_quotes_gpc off, try this with 255: # wwwmilw0rmcom/idphp?id=1140 (wwwexploit-dbcom/exploits/1140/)) # # coded by rgod at rgodaltervista ...