| VID |
21991 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The UBB.threads software is vulnerable to a command injection vulnerability in the 'admin/doeditconfig.php' script. UBB.Threads is a bulletin board system written in PHP. UBB.Threads version 6.5.1.1 and possible other versions are vulnerable to a command injection vulnerability, caused by improper validation of user-supplied input passed to the 'thispath' and 'config' parameters of the 'admin/doeditconfig.php' script. If the 'register_globals' is enabled, a remote attacker could send a specially-crafted URL request, which could allow the remote attacker modify configuration settings and injecting arbitrary PHP code on the affected host.
* References: http://www.securityfocus.com/archive/1/archive/1/447359/100/0/threaded http://archives.neohapsis.com/archives/bugtraq/2006-09/0495.html http://milw0rm.com/exploits/2457
* Platforms Affected: Groupee, Inc., UBB.threads versions 6.5.1.1 and possible other versions Any operating system Any version |
| Recommendation |
Upgrade to the latest version of UBB.threads (6.5.5 or later), available from the ubbcentral Web site at http://www.ubbcentral.com/ubbthreads/
As a workaround, disable PHP's 'register_globals' setting. |
| Related URL |
CVE-2006-5136 (CVE) |
| Related URL |
20266 (SecurityFocus) |
| Related URL |
29274 (ISS) |
|