[UNIX] JSBoard Multiple Extensions Vulnerability

From: SecuriTeam (support_at_securiteam.com)
Date: 12/28/04

  • Next message: SecuriTeam: "[UNIX] Multiple Extensions Vulnerability in phpBB Attachment Mod"
    To: list@securiteam.com
    Date: 28 Dec 2004 16:48:59 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      JSBoard Multiple Extensions Vulnerability
    ------------------------------------------------------------------------

    SUMMARY

     <http://kldp.net/projects/jsboard/> JSBoard is "one of widely used web
    BBS applications in Korea". However, an input validation flaw in JSBoard
    allows a malicious attackers to run arbitrary commands with the privileges
    of the HTTPD process, which is typically run as the nobody user.

    DETAILS

    Vulnerable Systems:
     * JSBoard version 2.0.8 and prior
     * JSBoard version JSBoard 1.3.11 and prior

    Immune Systems:
     * JSBoard version 2.0.9 or newer
     * JSBoard version JSBoard 1.3.12 or newer

    JSBoard doesn't implemented any type of check in "include/parse.php" for
    multiple extensions of uploaded files, e.g. attack.php.rar. Therefore,
    malicious attackers can upload arbitrary script files (PHP, pl, CGI, etc)
    to a web server. This is vulnerability is caused by Apache's MIME module
    (mod_mime), which regards attack.php.rar as a normal PHP file and execute
    the file through mod_php module with the privilege of the HTTPD process.

    Disclosure Timeline:
    2004-12-08 Vulnerability found
    2004-12-08 JSBoard developer notified
    2004-12-09 Update version released
    2004-12-15 Official release

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:advisory@stgsecurity.com>
    SSR Team.

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[UNIX] Multiple Extensions Vulnerability in phpBB Attachment Mod"

    Relevant Pages

    • [UNIX] JSBoard Arbitrary File Reading
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Due to improper input filtering by JSBoard a remote attacker can include ... 2004-12-31 Vulnerability found. ...
      (Securiteam)
    • [UNIX] Trend Micro VirusWall Buffer Overflow in VSAPI Library
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... buffer overflow vulnerability in VSAPI library allows arbitrary code ... is called "vscan" which is set suid root by default. ... permissions and thus granted all local users the privilege to execute the ...
      (Securiteam)
    • [UNIX] SCO Multiple Local Buffer Overflow
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Local exploitation of a buffer overflow vulnerability in the ppp binary, ... allows attackers to gain root privileges. ...
      (Securiteam)
    • [NT] Microsoft Word 6.0/95 Document Converter Buffer Overflow (MS04-041)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... WordPad is "a word processing application that uses the MFC rich edit ... Remote exploitation of a buffer overflow vulnerability in Microsoft ... Microsoft Word format files into the Rich Text Format natively handled by ...
      (Securiteam)
    • [UNIX] Tikiwiki Command Injection and Arbitrary File Exposure Vulnerabilities
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Two security vulnerabilities have been recently discovered in Tikiwiki, ... Remote exploitation of an input validation vulnerability in Tikiwiki ... allows attackers to gain access to arbitrary files on the vulnerable ...
      (Securiteam)