Vulnerabilities > CVE-2006-2319 - Input Validation vulnerability in IdealBB
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
PARTIAL Availability impact
NONE Summary
Ideal Science Ideal BB 1.5.4a and earlier does not properly check file extensions before permitting an upload, which allows remote attackers to upload and execute an ASP script via a 0x00 character before the ".asp" portion of the filename.
Vulnerable Configurations
Nessus
NASL family | CGI abuses |
NASL id | IBB_154B.NASL |
description | The remote host is running Ideal BB, an ASP-based forum software. According to its banner, the version of Ideal BB installed on the remote host reportedly allows an attacker to upload files with arbitrary ASP code, to view files under the web root, and to launch SQL injection and cross-site scripting attacks. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21337 |
published | 2006-05-11 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21337 |
title | IdealBB < 1.5.4b Multiple Vulnerabilities (XSS, SQLi, Upload, Traversal) |
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/045887.html
- http://secunia.com/advisories/20035
- http://securityreason.com/securityalert/871
- http://www.idealscience.com/ibb/posts.aspx?postID=24415
- http://www.osvdb.org/25456
- http://www.securityfocus.com/archive/1/433248/100/0/threaded
- http://www.securityfocus.com/bid/17920
- http://www.vupen.com/english/advisories/2006/1729
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26353