Lucene search

K
openvasCopyright (C) 2004 David MaciejakOPENVAS:136141256231014782
HistoryNov 03, 2005 - 12:00 a.m.

YaBB 1 GOLD SP 1.3.2 Multiple Vulnerabilities

2005-11-0300:00:00
Copyright (C) 2004 David Maciejak
plugins.openvas.org
45

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

6.8 Medium

AI Score

Confidence

Low

0.015 Low

EPSS

Percentile

87.1%

Yet another Bulletin Board (YaBB) is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2004 David Maciejak
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.14782");
  script_version("2023-08-03T05:05:16+0000");
  script_tag(name:"last_modification", value:"2023-08-03 05:05:16 +0000 (Thu, 03 Aug 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-2004-2402", "CVE-2004-2403");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_name("YaBB 1 GOLD SP 1.3.2 Multiple Vulnerabilities");
  script_category(ACT_ATTACK);
  script_copyright("Copyright (C) 2004 David Maciejak");
  script_family("Web application abuses");
  script_dependencies("find_service.nasl", "no404.nasl", "webmirror.nasl", "DDI_Directory_Scanner.nasl", "cross_site_scripting.nasl", "global_settings.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");

  script_xref(name:"URL", value:"http://archives.neohapsis.com/archives/bugtraq/2004-09/0227.html");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/11214");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/11215");

  script_tag(name:"solution", value:"No known solution was made available for at least one year since
  the disclosure of this vulnerability. Likely none will be provided anymore. General solution options
  are to upgrade to a newer release, disable respective features, remove the product or replace the
  product by another one.");

  script_tag(name:"summary", value:"Yet another Bulletin Board (YaBB) is prone to multiple vulnerabilities.");

  script_tag(name:"insight", value:"The following flaws exist:

  - CVE-2004-2402: A Cross-Site Scripting (XSS) vulnerability. This issue is due to a failure of
  the application to properly sanitize user-supplied input.

  As a result of this vulnerability, it is possible for a remote attacker to create a malicious
  link containing script code that will be executed in the browser of an unsuspecting user when followed.

  - CVE-2004-2403: A Cross-Site Request Forgery (CSRF) vulnerability.

  - Another flaw in YaBB may allow an attacker to execute malicious administrative commands on the remote
  host by sending malformed IMG tags in posts to the remote YaBB forum and waiting for the forum
  administrator to view one of the posts.");

  script_tag(name:"affected", value:"YaBB 1 GOLD SP 1.3.2 is known to be affected. Other versions might
  be affected as well.");

  script_tag(name:"solution_type", value:"WillNotFix");
  script_tag(name:"qod_type", value:"remote_analysis");

  exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");
include("port_service_func.inc");
include("list_array_func.inc");

port = http_get_port( default:80 );

host = http_host_name( dont_add_port:TRUE );
if( http_get_has_generic_xss( port:port, host:host ) )
  exit( 0 );

foreach dir( make_list_unique( "/yabb", "/forum", http_cgi_dirs( port:port ) ) ) {

  if( dir == "/" )
    dir = "";

  url = dir + "/YaBB.pl";
  res = http_get_cache( port:port, item:url );
  if( ! res || ( "Powered by YaBB" >!< res && "yabbforum.com" >!< res ) )
    continue;

  url = dir + "/YaBB.pl?board=;action=imsend;to=%22%3E%3Cscript%3Efoo%3C/script%3E";

  req = http_get( item:url, port:port );
  res = http_keepalive_send_recv( port:port, data:req );

  if( res =~ "^HTTP/1\.[01] 200" && egrep( pattern:"<script>foo</script>", string:res ) ) {
    report = http_report_vuln_url( port:port, url:url );
    security_message( port:port, data:report );
    exit( 0 );
  }
}

exit( 99 );

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

6.8 Medium

AI Score

Confidence

Low

0.015 Low

EPSS

Percentile

87.1%

Related for OPENVAS:136141256231014782