[UNIX] YaBB Cross-Site Scripting Vulnerability (NULL)

From: support@securiteam.com
Date: 06/23/02

From: support@securiteam.com
To: list@securiteam.com
Date: Sun, 23 Jun 2002 21:42:07 +0200 (CEST)

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

When was the last time you checked your server's security?
How about a monthly report?
http://www.AutomatedScanning.com - Know that you're safe.
- - - - - - - - -

  YaBB Cross-Site Scripting Vulnerability (NULL)


 <http://yabb.xnull.com/> YaBB is a leading provider of free, downloadable
Perl forums for webmasters. A security vulnerability in the product allows
a remote attacker to insert malicious HTML and JavaScript into web pages
presented to users.


Vulnerable systems:
 * YaBB 1 Gold SP1 and earlier versions

When accessing a thread that does not exist, YaBB will give an error about
the board not existing.

This will trigger an error in the CGI script and output the following:
This topic does not exist on this board. NULL : 96.

The problem here should be obvious. By constructing JavaScript code in
place of NULL, a malicious user can trick someone into running the code of
his or her choice, since YaBB does not filter user input/script output.


Vendor status:
Vendor was notified 05/14/02.


The information has been provided by
methodic@bigunz.angrypacket.com> methodic.


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com


The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.