CVE-2021-23835

An issue was discovered in flatCore before 2.0.0 build 139. A local file disclosure vulnerability was identified in the docs_file HTTP request body parameter for the acp interface. This can be exploited with admin access rights. The affected parameter (which retrieves the contents of the specified file) was found to be accepting malicious user input without proper sanitization, thus leading to retrieval of backend server sensitive files, e.g., /etc/passwd, SQLite database files, PHP source code, etc.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:flatcore:flatcore:*:*:*:*:*:*:*:*

History

22 Jan 2021, 16:14

Type Values Removed Values Added
CPE cpe:2.3:a:flatcore:flatcore:*:*:*:*:*:*:*:*
CWE CWE-20
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 4.9
References (MISC) https://github.com/flatCore/flatCore-CMS - (MISC) https://github.com/flatCore/flatCore-CMS - Product, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/160936/flatCore-CMS-XSS-File-Disclosure-SQL-Injection.html - (MISC) http://packetstormsecurity.com/files/160936/flatCore-CMS-XSS-File-Disclosure-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry
References (MISC) https://sec-consult.com/vulnerability-lab/ - (MISC) https://sec-consult.com/vulnerability-lab/ - Third Party Advisory

15 Jan 2021, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-01-15 07:15

Updated : 2023-12-10 13:41


NVD link : CVE-2021-23835

Mitre link : CVE-2021-23835

CVE.ORG link : CVE-2021-23835


JSON object : View

Products Affected

flatcore

  • flatcore
CWE
CWE-20

Improper Input Validation