Vulnerabilities > CVE-2000-1176 - Unspecified vulnerability in Yabb 20000911

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
yabb
nessus
exploit available

Summary

Directory traversal vulnerability in YaBB search.pl CGI script allows remote attackers to read arbitrary files via a .. (dot dot) attack in the "catsearch" form field.

Vulnerable Configurations

Part Description Count
Application
Yabb
1

Exploit-Db

descriptionYaBB 9.11.2000 search.pl Arbitrary Command Execution Vulnerability. CVE-2000-1176. Remote exploit for cgi platform
idEDB-ID:20387
last seen2016-02-02
modified2000-11-07
published2000-11-07
reporterrpc
sourcehttps://www.exploit-db.com/download/20387/
titleYaBB 9.11.2000 - search.pl Arbitrary Command Execution Vulnerability

Nessus

NASL familyCGI abuses
NASL idYABBSE_CMD_EXEC.NASL
descriptionThe remote host is using the YaBB SE forum management system. According to its version number, this forum is vulnerable to a code injection bug that could allow an attacker with a valid account to execute arbitrary commands on this host by sending a malformed
last seen2020-06-01
modified2020-06-02
plugin id11588
published2003-05-07
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11588
titleYaBB SE < 1.5.2 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
 script_id(11588);
 script_version ("1.24");
 script_cve_id("CVE-2000-1176");
 script_bugtraq_id(1921, 6591, 6663, 6674, 7399);

 script_name(english:"YaBB SE < 1.5.2 Multiple Vulnerabilities");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP application that is affected by
multiple vulnerabilities." );
 script_set_attribute(attribute:"description", value:
"The remote host is using the YaBB SE forum management system. 

According to its version number, this forum is vulnerable to a code
injection bug that could allow an attacker with a valid account to
execute arbitrary commands on this host by sending a malformed
'language' parameter in the web request. 

In addition to this flaw, this version is vulnerable to other flaws
such as SQL injection and directory traversal." );
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?082d4dcc" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to YaBB SE 1.5.2 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "2003/05/07");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/11/07");
 script_cvs_date("Date: 2018/08/07 16:46:50");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 script_summary(english:"Determine if YaBB SE can be used to execute arbitrary commands");
 script_category(ACT_GATHER_INFO);
 script_family(english:"CGI abuses");
 script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
 script_dependencie("find_service1.nasl", "http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_keys("www/PHP");
 exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80, embedded: 0);
if(!can_host_php(port:port))exit(0);


if (thorough_tests) dirs = list_uniq(make_list("/yabbse", "/forum", cgi_dirs()));
else dirs = make_list(cgi_dirs());

foreach dir (dirs)
{
 url = string(dir, "/index.php?board=nonexistant", rand());
 r = http_send_recv3(method: "GET", item:url, port:port);
 if (isnull(r)) exit(0);
 if(egrep(pattern:".*Powered by.*YaBB SE (0\.|1\.([0-4]\.|5\.[01])).*YaBB", string: r[2]))
   {
    security_warning(port);
    set_kb_item(name: 'www/'+port+'/SQLInjection', value: TRUE);
    exit(0);
   }
}