header-logo
Suggest Exploit
vendor:
YaBB
by:
Unknown
7.5
CVSS
HIGH
Command Execution
77
CWE
Product Name: YaBB
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: YES
Related CWE:
CPE: a:yabb:yabb
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

YaBB Administrator Command Execution Vulnerability

YaBB is affected by an administrator command execution vulnerability. This issue allows a remote attacker to create a malicious URI link or embed a malicious URI between IMG tags, which includes hostile YaBB administrative commands. If an unsuspecting forum administrator views a post that contains this IMG tag, they will inadvertently activate the malicious URI, and the attacker-supplied command is carried out with the administrator's privileges.

Mitigation:

It is recommended to update to the latest version of YaBB to mitigate this vulnerability.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11214/info

It is reported that YaBB is affected by an administrator command execution vulnerability. This issue is due to a failure of the application to properly validate access to administrative commands.

This issue permits a remote attacker to create a malicious URI link or embed a malicious URI between IMG tags, which includes hostile YaBB administrative commands. If an unsuspecting forum administrator views a post that contains this IMG tag, they will inadvertently activate the malicious URI, the attacker-supplied command is carried out with the administrator's privileges.

<img>http://www.example.com/YaBB.pl?board=;action=modifycat;id=CATEGORYNAMEHERE;moda=Remove2</img>