Ultimate Bulletin Board任意命令执行漏洞

漏洞信息详情

Ultimate Bulletin Board任意命令执行漏洞

漏洞简介

Infopop Ultimate Bulletin Board (UBB)存在漏洞。远程攻击者借助主题隐藏字段中的shell元字符可以执行命令。

漏洞公告

A quick fix is to add “$” to the end of the expression, ie:
if ($ThreadFile =~ /\d\d\d\d\d\d\.ubb$/) { …
This will require that the value of $Threadfile end in “.ubb” to match.
This vulnerability was verified to have been fixed in the shareware version (and presumably the commercial as well).

参考网址

来源: www.ultimatebb.com
链接:http://www.ultimatebb.com/home/versions.shtml

来源: BUGTRAQ
名称: 20000211 perl-cgi hole in UltimateBB by Infopop Corp.
链接:http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-8&msg=20000211224935.A13236@infomag.ape.relarn.ru

来源: BUGTRAQ
名称: 20000225 FW: Important UBB News For Licensed Users
链接:http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-22&msg=NDBBLKOPOLNKELHPDEFKIEPGCAAA.renzo.toma@veronica.nl

来源: BID
名称: 991
链接:http://www.securityfocus.com/bid/991

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享