[原文]Direct code injection vulnerability in FlatNuke 2.5.3 allows remote attackers to execute arbitrary PHP code by placing the code into the Referer header of an HTTP request, which causes the code to be injected into referer.php, which can then be accessed by the attacker.
FlatNuke contains a flaw that may allow a malicious user to execute arbitrary PHP command. The issue is due to insufficient input validation in the referer.php script. When an attacker first sends a specially crafted request with a spoofed referer field to the website, then directly accesses the referer.php script, the website will execute the PHP commands in the referer field.
Upgrade to version 2.5.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.