header-logo
Suggest Exploit
vendor:
YaBB
by:
SecurityFocus
7.5
CVSS
HIGH
Arbitrary Command Execution
78
CWE
Product Name: YaBB
Affected Version From: YaBB version 1.5.1 and earlier
Affected Version To: YaBB version 1.5.1 and earlier
Patch Exists: YES
Related CWE: N/A
CPE: a:yabb:yabb
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Windows
2001

YaBB search.pl Arbitrary Command Execution Vulnerability

YaBB (Yet Another Bulletin Board) is a popular perl-based bulletin board scripting package. search.pl, one of several perl scripts which comprise YaBB, fails to properly validate user input which arguments a call to open(). A malicious user could supply a string containing '/../'-type sequences and shell commands. As a result of search.pl's failure to reject this type of input, it is possible to traverse the script's normal working directories, and to execute arbitrary commands on the host with the privelege level of YaBB. This can lead to an anonymous internet user gaining shell access to the host. An attacker could easily create a malicious html form with a catsearch such as: ./../../../../../usr/bin/touch%20/tmp/foo|

Mitigation:

Upgrade to YaBB version 1.5.2 or later.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/1921/info

YaBB (Yet Another Bulletin Board) is a popular perl-based bulletin board scripting package.

search. pl, one of several perl scripts which comprise YaBB, fails to properly validate user input which arguments a call to open(). 

A malicious user could supply a string containing '/../'-type sequences and shell commands. As a result of search.pl's failure to reject this type of input, it is possible to traverse the script's normal working directories, and to execute arbitrary commands on the host with the privelege level of YaBB. This can lead to an anonymous internet user gaining shell access to the host.


An attacker could easily create a malicious html form with a catsearch such as:
./../../../../../usr/bin/touch%20/tmp/foo|