Lucene search

K

bb-14h2.txt

🗓️ 13 Jul 2000 00:00:00Reported by XternalType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 23 Views

Exploit on bb14h2 allows remote command execution via unvalidated file extensions on port 1984.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`versions affected: bb14h2 (current) and older  
  
  
exploit:  
bbd listens for incoming connections on port 1984.  
Using telnet or the bb client, it is possible to  
connect and create a filename with an arbitrary  
extension, as the extension is not rigorously checked.  
As this file is droped into a directory accessible  
via the web server, any file extension that is parsed  
server side can be abused. For example:  
  
./bb 1.2.3.4 "status evil.php3 <?<system(\"cat  
/etc/passwd\");?>"  
  
will allow viewing of the /etc/passwd upon browsing to  
http://1.2.3.4/bb/logs/evil.php3.  
  
  
solutions:  
-Modify bbd.c to only allowed specified file  
extensions(.disk, .proc ...)  
  
-Implement access restrictions via  
$BBHOME/etc/security to minimize exposure to  
vulnerabilities. Unfortunately, the default install  
doesn't enable the security file.  
  
  
__________________________________________________  
Do You Yahoo!?  
Get Yahoo! Mail – Free email you can access from anywhere!  
http://mail.yahoo.com/  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
13 Jul 2000 00:00Current
7.4High risk
Vulners AI Score7.4
23
.json
Report