[UNIX] YaBB Forum member.vars CRLF Injection Privilege Escalation Vulnerability
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 13 Jun 2007 10:33:36 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
YaBB Forum member.vars CRLF Injection Privilege Escalation Vulnerability
<http://www.yabbforum.com/> YaBB (Yet another Bulletin Board) is "an Open
Source community forum system written in Perl". Remote exploitation of an
input validation error within version 2.1 of YaBB Forum allows attackers
to register with forum Administrator privileges.
* YaBB Forum version 2.1
The problem specifically exists due to insufficient validation when
writing to the "vars" file for each user. By setting the values of
certain variables to contain certain characters, attackers can elevate
their privileges to that of the forum Administrator.
Exploitation allows attackers to obtain Administrator privileges, which
include the ability to modify forum templates (i.e., Perl code). This
allows administrators to execute arbitrary commands in the context of the
web server running the forum.
This attack can be performed during registration. This allows
unauthenticated attackers to obtain forum Administrator privileges at
registration time via the register.pl script.
Additionally, once registered, a forum user can modify their profile and
conduct this attack using the profile.pl script.
Disabling the registration feature of the forum mitigates this issue.
The YaBB Forum team has addressed this vulnerability by releasing a
software update. For more information consult the following announce on
their home site.
05/23/2007 - Initial vendor notification
05/23/2007 - Initial vendor response
06/12/2007 - Coordinated public disclosure
The information has been provided by
<mailto:idlabs-advisories@xxxxxxxxxxxx> iDefense Labs Security Advisories.
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [NT] Microsoft License Manager and urlmon.dll COM Object Interaction Invalid Memory Access Vulnerability
- Next by Date: [NT] Vulnerability in Win 32 API Allows Code Execution (MS07-035)
- Previous by thread: [NT] Microsoft License Manager and urlmon.dll COM Object Interaction Invalid Memory Access Vulnerability
- Next by thread: [NT] Vulnerability in Win 32 API Allows Code Execution (MS07-035)