First published: Thu Nov 01 2007(Updated: )
Direct static code injection vulnerability in the download module in Flatnuke 3 allows remote authenticated administrators to inject arbitrary PHP code into a description.it.php file in a subdirectory of Download/ by saving a description and setting fneditmode to 1. NOTE: unauthenticated remote attackers can exploit this by leveraging a cookie manipulation issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postnuke Software Foundation Pnphpbb |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5772 has a high severity due to its potential for remote code execution by authenticated users.
To fix CVE-2007-5772, users should upgrade to a patched version of Flatnuke that addresses this vulnerability.
CVE-2007-5772 affects installations of Flatnuke 3 where remote authenticated administrators can inject code.
The attack vector for CVE-2007-5772 involves authenticated users manipulating the file upload process to inject code.
Yes, CVE-2007-5772 requires user authentication, making it exploitable only by administrators.