[] NeoSense

FlatNuke 2.5.x - 'index.php?where' Full Path Disclosure

Author: SecWatch
type: webapps
platform: php
port: 
date_added: 2005-06-07 
date_updated: 2013-05-29 
verified: 1 
codes: CVE-2005-1893;OSVDB-17169 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/13882/info

Multiple input validation vulnerabilities reportedly affect FlatNuke. These issues are due to a failure of the application to properly sanitize user-supplied input prior to using it in application-critical actions such as generating Web content or loading scripts.

An attacker may leverage these issues to execute arbitrary PHP code, execute client-side script code in the browsers of unsuspecting users through cross-site scripting attacks, and gain access to sensitive information. Other attacks are also possible.

http://www.example.com/flatnuke/index.php?mod=none_Search&find=1&where=null