Project: Github flatCore/flatCore-CMS 20191112

Vulnerability: #9253368 (2019-11-12 09:27:15)

Warning

There are many false positives, or unexploitable vulnerabilities. Please create working "PoC" exploit before reporting anything to vendor!

Details:

Sink Standard::is_dir
Risk _GET
/flatCore-CMS-master/install/index.php:18 (show/hide source)
1  <?php
2  
3  /**
4   * flatCore Content Management System
5   * Installer/Updater
6   *
7   * @package: install/
8   * @author: Patrick Konstandin <support@flatcore.de>
9   *
10   */
11  
12  session_start();
13  error_reporting(0);
14  $modus = '';
15  define('INSTALLER', TRUE);
16  
17  
18 if(isset($_GET['l']) && is_dir('../lib/lang/'.basename($_GET['l']).'/')) {
19 $_SESSION['lang'] = basename($_GET['l']); 20 }
Threat level 1

Callstack:

@INLINE::/flatCore-CMS-master/install/index.php /flatCore-CMS-master/install/index.php:18 (show/hide source)
1  <?php
2  
3  /**
4   * flatCore Content Management System
5   * Installer/Updater
6   *
7   * @package: install/
8   * @author: Patrick Konstandin <support@flatcore.de>
9   *
10   */
11  
12  session_start();
13  error_reporting(0);
14  $modus = '';
15  define('INSTALLER', TRUE);
16  
17  
18 if(isset($_GET['l']) && is_dir('../lib/lang/'.basename($_GET['l']).'/')) {
19 $_SESSION['lang'] = basename($_GET['l']); 20 }