Vulnerabilities > CVE-2000-0853 - Unspecified vulnerability in Yabb 20000901
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
YaBB Bulletin Board 9.1.2000 allows remote attackers to read arbitrary files via a .. (dot dot) attack.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | YaBB 9.1.2000 Arbitrary File Read Vulnerability. CVE-2000-0853. Remote exploit for cgi platform |
id | EDB-ID:20218 |
last seen | 2016-02-02 |
modified | 2000-09-10 |
published | 2000-09-10 |
reporter | pestilence |
source | https://www.exploit-db.com/download/20218/ |
title | YaBB 9.1.2000 - Arbitrary File Read Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | YABB.NASL |
description | The |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10512 |
published | 2000-09-12 |
reporter | This script is Copyright (C) 2000-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/10512 |
title | YaBB YaBB.pl num Parameter Traversal Arbitrary File Access |
code |
|
Seebug
bulletinFamily | exploit |
description | BugCVE: CVE-2000-0853 BUGTRAQ: 1668 YaBB.pl是一个基于Web的公告牌脚本程序。YaBB.pl它将公告牌中的文章存放在编号的文本文件中。编号的文件名是在调用YaBB.pl时通过变量num=<file>来指定的。在检索该文件之前,YaBB在<file>后面添加一个后缀.txt。 由于YaBB中的输入合法性检查错误,在<file>中可以指定相对路径。这包括../类型的路径。此外,<file>可以不是数字格式,而且.txt后缀可以通过在<file>后面添加%00来避免。通过在单个请求中使用上述的这些漏洞,恶意用户可以察看Web服务器可以存取的任何文件。 9.1.2000 YaBB ---- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: YaBB Upgrade YaBB 9.11.2000 <a href=http://www.yabb.org/download/yabb.zip target=_blank>http://www.yabb.org/download/yabb.zip</a> |
id | SSV:4308 |
last seen | 2017-11-19 |
modified | 2008-10-25 |
published | 2008-10-25 |
reporter | Root |
source | https://www.seebug.org/vuldb/ssvid-4308 |
title | YABB远程文件泄露漏洞 |