Ravens PHP Scripts

YaBB CRLF Injection Privilege Escalation Vulnerability
Date: Wednesday, June 13, 2007 @ 19:46:58 CEST
Topic: Security


SECUNIA ADVISORY ID: SA25656

VERIFY ADVISORY: http://secunia.com/advisories/25656/

CRITICAL: Highly critical

IMPACT: Privilege escalation

WHERE: >From remote

SOFTWARE: YaBB 2.x - http://secunia.com/product/6070/

DESCRIPTION: A vulnerability has been reported in YaBB, which can be exploited by malicious users and malicious people to gain escalated privileges.



Input passed to certain profile form fields is not properly sanitised before being written to the profile data (.vars) file for a user. This can be exploited to inject special characters and gain forum administrator privileges. This can further be exploited to execute arbitrary Perl code by modifying the forum templates. The vulnerability is reported in version 2.1. Other versions may also be affected.

SOLUTION: Apply patch. - http://www.yabbforum.com/community/?board=general;action=display;num=1181678785

PROVIDED AND/OR DISCOVERED BY: Peter Vreugdenhil, reported via iDefense.

ORIGINAL ADVISORY: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=538






This article comes from Ravens PHP Scripts
http://www.ravenphpscripts.com

The URL for this story is:
http://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2959