Vulnerability
    Yabb
Affected
    Yabb
Description
    Kosak found following.  There is an input validation problem  with
    the  'catsearch'  field,  which  gets  interpolated  in  an   open
    statement:
        open(FILE, "$boardsdir/$cattosearch") || &fatal_error("$txt{'23'}
        $currentboard.txt");
    where $cattosearch is a localized $catsearch, assigned:
        $catsearch = $FORM{'catsearch'};
    An  attacker  could  easily  create  a  malicious html form with a
    catsearch such as:
        ./../../../../../usr/bin/touch%20/tmp/foo|
    The amount  of directory  traversal will  vary from  site to site,
    depending on their YaBB setup.
Solution
    Nothing yet.
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH