TUCoPS :: Web BBS :: Frequently Exploited :: yabb2.htm

YaBB catsearch vulnerability
Vulnerability

    Yabb

Affected

    Yabb

Description

    Kosak found following.  There is an input validation problem  with
    the  'catsearch'  field,  which  gets  interpolated  in  an   open
    statement:

        open(FILE, "$boardsdir/$cattosearch") || &fatal_error("$txt{'23'}
        $currentboard.txt");

    where $cattosearch is a localized $catsearch, assigned:

        $catsearch = $FORM{'catsearch'};

    An  attacker  could  easily  create  a  malicious html form with a
    catsearch such as:

        ./../../../../../usr/bin/touch%20/tmp/foo|

    The amount  of directory  traversal will  vary from  site to site,
    depending on their YaBB setup.

Solution

    Nothing yet.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH