Code Injection in flatcore/flatcore-cms
Valid
Reported on
Oct 13th 2021
Description
Another code injection payload in link_name.
Proof of Concept
Insert into linkname
${`sleep 10`}
Go to http://[FLATCORE-IP]/flatCore-CMS/content/cache/cache_lastedit.php and see that the page has stopped for 10 seconds.
${} escapes the string, ` switches context to OS commands.
Impact
Blind RCE as admin user.
Occurrences
functions.php L389L397
should clean permalinks too
We have contacted a member of the
flatcore/flatcore-cms
team and are waiting to hear back
2 years ago
haxatron modified the report
2 years ago
functions.php#L389L397
has been validated
to join this conversation