First published: Wed Jun 20 2007(Updated: )
Directory traversal vulnerability in Yet another Bulletin Board (YaBB) 2.1 and earlier allows remote authenticated users to execute arbitrary Perl code via a .. (dot dot) in the userlanguage profile setting, which sets the userlanguage key of the member hash, and is propagated to the language variable in (1) HelpCentre.pl and (2) ICQPager.pl, (3) the use_lang variable in Subs.pl, and the actlang variable in (4) Post.pl and (5) InstantMessage.pl; as demonstrated by pointing userlanguage to the English folder, modifying English/HelpCentre.lng file to contain Perl statements, and then invoking the help action in YaBB.pl.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yabb | =2.0_rc2 | |
Yabb | =2.0_rc1 | |
Yabb | =2.1 | |
Yabb | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3295 is classified as a high severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2007-3295, upgrade your YaBB software to version 2.2 or later as it contains patches for this vulnerability.
CVE-2007-3295 affects users of YaBB versions 2.1 and earlier, including 2.0_rc1 and 2.0_rc2.
CVE-2007-3295 allows remote authenticated users to execute arbitrary Perl code on the server.
CVE-2007-3295 was disclosed in June 2007.