exploit-db-mirror/exploits/cgi/webapps/24611.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

7 lines
No EOL
728 B
Text

source: https://www.securityfocus.com/bid/11214/info
It is reported that YaBB is affected by an administrator command execution vulnerability. This issue is due to a failure of the application to properly validate access to administrative commands.
This issue permits a remote attacker to create a malicious URI link or embed a malicious URI between IMG tags, which includes hostile YaBB administrative commands. If an unsuspecting forum administrator views a post that contains this IMG tag, they will inadvertently activate the malicious URI, the attacker-supplied command is carried out with the administrator's privileges.
<img>http://www.example.com/YaBB.pl?board=;action=modifycat;id=CATEGORYNAMEHERE;moda=Remove2</img>