Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> YaBB Information Disclosure


Vulnerability Assessment Details

YaBB Information Disclosure

Vulnerability Assessment Summary
Searches for the existence of YaBB.pl

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a CGI script that suffers from an
information disclosure vulnerability.

Description :

The 'YaBB.pl' CGI script is installed on the remote host. This script
has a well documented security flaw that lets a possible hacker read arbitrary
files with the rights of the http daemon (usually root or nobody).

See also :

http://archives.neohapsis.com/archives/bugtraq/2000-09/0072.html

Solution :

Remove 'YaBB.pl' or upgrade to the latest version.

Network Security Threat Level:

Medium / CVSS Base Score : 4
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:C)

Networks Security ID: 1668

Vulnerability Assessment Copyright: This script is Copyright (C) 2000 Renaud Deraison

Cables, Connectors

Linksys Cisco USB WUSB600N Ver. 2 Wireless Network Adapter with Dual-Band
$9.0
Linksys Cisco USB WUSB600N Ver. 2 Wireless   Network Adapter with Dual-Band  pictureCisco Catalyst WS-C3750G-24TS-S1U 24-port Gigabit Ethernet Switch
$22.0
Cisco Catalyst WS-C3750G-24TS-S1U 24-port Gigabit Ethernet Switch pictureCisco Fasthub 400 Series 24-port 10/100 Managed Hub- WS-C424M
$75.0
Cisco Fasthub 400 Series 24-port 10/100 Managed Hub- WS-C424M pictureCisco Catalyst 3750G Series Switch WS-C3750G-24TS-E1U 24 Ports Ships Free
$89.99
Cisco Catalyst 3750G Series Switch WS-C3750G-24TS-E1U 24 Ports Ships Free picture


Discussions

No Discussions have been posted on this vulnerability.