The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Vulnerability in YaBB forum (Perl version without SQL)


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 2 May 2004 09:39:37 -0000
From: Dmitry Shurupov <[email protected]>
To: [email protected]
Subject: Vulnerability in YaBB forum (Perl version without SQL)



There's a vulnerability in non-SQL version of YaBB forum (I've checked it with YaBB 1 Gold - SP 1.2 written in Perl -- it's not new, but is in use even nowadays).

You can input almost anything into .txt file from boards directory. The "subject" form field isn't checked for "\n" symbols, so creating of a thread with such subject:

"test
of
vulnerability"

will add to the current board .txt file these strings:

"<seconds_from_Epoch>|test
of
vulnerability|<authors_nick>|<email>|<date>|<replies>|<authors_accont>|<icon>|<thread_status>"



To fix the problem look at sub Post2 in Post.pl and add this:

$subject =~ s/\n/ /g;

after this line:

$subject = $FORM{'subject'};

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру