ikonboard Arbitrary Command Execution Vulnerability
BID:2157
Info
ikonboard Arbitrary Command Execution Vulnerability
| Bugtraq ID: | 2157 |
| Class: | Input Validation Error |
| CVE: |
CVE-2001-0076 |
| Remote: | No |
| Local: | Yes |
| Published: | Dec 28 2000 12:00AM |
| Updated: | Jul 11 2009 04:46AM |
| Credit: | This vulnerability was announced by Gijs Hollestelle <[email protected]> on December 28, 2000. |
| Vulnerable: |
Ikonboard.com ikonboard 2.1.7 b |
| Not Vulnerable: | |
Exploit / POC
ikonboard Arbitrary Command Execution Vulnerability
Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution / Fix
ikonboard Arbitrary Command Execution Vulnerability
Solution:
This code was sent by Gijs Hollestelle <[email protected]> and is reportedly the official vendor fix to the problem code:
From register.cgi:
@params = $query->param;
foreach $param(@params) {
$theparam = $query->param($param);
$theparam = &unHTML("$theparam");
${$param} = $theparam;
}
Replace with:
for ('inmembername','password','emailaddress',
'showemail','homepage','aolname','icqnumber','location','interests',
'signature','timedifference','useravatar','action') {
next unless defined $_;
next if $_ eq 'SEND_MAIL';
$tp = $query->param($_);
$tp = &unHTML("$tp");
${$_} = $tp;
}
Solution:
This code was sent by Gijs Hollestelle <[email protected]> and is reportedly the official vendor fix to the problem code:
From register.cgi:
@params = $query->param;
foreach $param(@params) {
$theparam = $query->param($param);
$theparam = &unHTML("$theparam");
${$param} = $theparam;
}
Replace with:
for ('inmembername','password','emailaddress',
'showemail','homepage','aolname','icqnumber','location','interests',
'signature','timedifference','useravatar','action') {
next unless defined $_;
next if $_ eq 'SEND_MAIL';
$tp = $query->param($_);
$tp = &unHTML("$tp");
${$_} = $tp;
}
References
ikonboard Arbitrary Command Execution Vulnerability
References:
References: