lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 9 Apr 2017 13:23:09 +0000
From: Wester 95 <evilzyzeng@...look.com>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: [FD] CVE Request:Directory Traversal in smilie module(MyBB <1.8.11)

Hi team,


I would like to request one CVE for this vulnerability, thank you!


#################################


Description:

============


product:MyBB

Homepage:https://mybb.com/

vulnerable  version:<1.8.11

Severity:Low risk


===============


Proof of Concept:


=============


vulnerability address:http://127.0.0.1/mybb_1810/Upload/admin/index.php?module=config-smilies&action=add_multiple


vulnerability  file directory:/webroot/mybb_1810/Upload/admin/modules/config/smilies.php


vulnerability  Code:


Line 326 $path = $mybb->input['pathfolder'];

Line 327 $dir = @opendir(MYBB_ROOT.$path);


if we input "pathfolder" to "../../bypass/smile",Directory Traversal success!


============


Fixed:

============


This vulnerability was fixed in version 1.8.11


https://blog.mybb.com/2017/04/04/mybb-1-8-11-merge-system-1-8-11-release/


=============


Best regards,

Zhiyang Zeng of Tencent security platform department


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ