Users login

Create an account »


Users login

Home » Hacking News » YaBB SE language remote file include vulnerability

YaBB SE language remote file include vulnerability

by Mario Miri on May 13th, 2003 YaBB SE may allow users to modify language file inclusion path. This could result in command execution in the context of the web server.

YaBB SE 1.1.3
YaBB SE 1.4.1
YaBB SE 1.5.0
YaBB SE 1.5.1 RC1
YaBB SE 1.5.1

This vulnerability is exploitable only if both allow_url_fopen and register_globals PHP variables are enabled.
The issue has been addressed in 1.5.2 version of the software:

Discovered by:
Next Generation Security Technologies

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »