UBB.threads Cookie Data language Parameter Local File Inclusion

2005-06-23T05:15:28
ID OSVDB:17512
Type osvdb
Reporter James Bercegay()
Modified 2005-06-23T05:15:28

Description

Vulnerability Description

UBB.threads contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to language preferences extracted from the cookie not properly sanitizing the 'language' parameter. This may allow an attacker to include an arbitrary file location, appended with a null byte (%00), that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Upgrade to version 6.5.2 beta or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

UBB.threads contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to language preferences extracted from the cookie not properly sanitizing the 'language' parameter. This may allow an attacker to include an arbitrary file location, appended with a null byte (%00), that contains arbitrary commands which will be executed by the vulnerable script.

References:

Vendor URL: http://www.ubbcentral.com/ubbthreads/ Vendor Specific Solution URL: http://www.ubbcentral.com/boards/showflat.php/Cat/0/Number/42351/Main/42351/#Post42351 Security Tracker: 1014285 Secunia Advisory ID:15805 Related OSVDB ID: 17517 Related OSVDB ID: 17518 Related OSVDB ID: 17521 Related OSVDB ID: 17525 Other Advisory URL: http://www.gulftech.org/?node=research&article_id=00084-06232005 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-06/0213.html ISS X-Force ID: 21128 CVE-2005-2061 Bugtraq ID: 14055