MyBB < 1.2.11 forumdisplay.php sortby Parameter Command Execution

High Nessus Network Monitor Plugin ID 4346

Synopsis

The remote web server contains a PHP script that allows arbitrary command execution.

Description

The version of MyBB installed on the remote host fails to sanitize input to the 'sortby' parameter of the 'forumdisplay.php' script before using it in an 'eval()' statement to evaluate PHP code. An unauthenticated attacker can leverage this issue to execute arbitrary code on the remote host subject to the privileges of the web server user ID. In addition, this version of MyBB is vulnerable to several SQL injection attacks that, if exploited, would give the attacker the ability to execute arbitrary SQL commands on the database server utilized by MyBB.

Solution

Upgrade to version 1.2.11 or higher.

See Also

http://www.waraxe.us/advisory-61.html

http://www.securityfocus.com/archive/1/486434/30/0/threaded

http://community.mybboard.net/showthread.php?tid=27227

Plugin Details

Severity: High

ID: 4346

Family: CGI

Published: 2008/01/17

Modified: 2016/01/15

Dependencies: 1442

Nessus ID: 29996

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 7.3

Temporal Score: 6.8

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mybb:mybb

Exploitable With

CANVAS (CANVAS)

Reference Information

CVE: CVE-2008-0382, CVE-2008-0383

BID: 27322, 27323