|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> CGI abuses >> YaBB SE Command Execution Vulnerability Assessment Details
|
YaBB SE Command Execution |
||
Determine if YaBB SE can be used to execute arbitrary commands Detailed Explanation for this Vulnerability Assessment Summary : The remote web server contains a PHP application that is affected by multiple vulnerabilities. Description : The remote host is using the YaBB SE forum management system. According to its version number, this forum is vulnerable to a code injection bug which may permit a possible hacker with a valid account to execute arbitrary commands on this host by sending a malformed 'language' parameter in the web request. In addition to this flaw, this version is vulnerable to other flaws such as SQL injection. See also : http://www.ngsec.com/docs/advisories/NGSEC-2003-5.txt Solution: Upgrade to YaBB SE 1.5.2 or later. Network Security Threat Level: Medium / CVSS Base Score : 4 (AV:R/AC:L/Au:R/C:P/A:P/I:P/B:N) Networks Security ID: 1921, 6591, 6663, 6674, 7399 Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Renaud Deraison |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |