lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: 2 May 2004 09:39:37 -0000 From: Dmitry Shurupov <root@...p.ru> To: bugtraq@...urityfocus.com Subject: Vulnerability in YaBB forum (Perl version without SQL) There's a vulnerability in non-SQL version of YaBB forum (I've checked it with YaBB 1 Gold - SP 1.2 written in Perl -- it's not new, but is in use even nowadays). You can input almost anything into .txt file from boards directory. The "subject" form field isn't checked for "\n" symbols, so creating of a thread with such subject: "test of vulnerability" will add to the current board .txt file these strings: "<seconds_from_Epoch>|test of vulnerability|<authors_nick>|<email>|<date>|<replies>|<authors_accont>|<icon>|<thread_status>" To fix the problem look at sub Post2 in Post.pl and add this: $subject =~ s/\n/ /g; after this line: $subject = $FORM{'subject'};
Powered by blists - more mailing lists