Vendor: Infopop Corporation
Version: <= 6.5.2 Beta
BID: 14050 14055
CVE: CVE-2005-2057 CVE-2005-2058 CVE-2005-2059 CVE-2005-2060 CVE-2005-2061
OSVDB: 17512 17517 17518 17521 17525
UBB Threads is a very popular forum system developed by Infopop. There are a number of vulnerabilities in UBB Threads that may allow an attacker to execute cross site scripting, http response splitting, and cross site request forgery attacks. Also, an attacker may include, execute, or read arbitrary local files. These vulnerabilities may allow for an attacker to completely compromise an installation of UBB Threads and possibly more. Users are encouraged to upgrade as soon as possible to the latest UBB Threads release.
Cross Site Scripting:
There are a large number of cross site scripting issues in UBB Threads. Due to the large number the examples I will simply put a [XSS] where an attacker might place offending code. Some examples might look like this.
These vulnerabilities can be used to steal sensitive information from a user, and possibly lead to malicious code execution in the context of the victims browser.
There are a number of SQL Injection issues in UBB Threads that allow for an attacker to influence, or disclose sensitive information in the underlying database. Below are some examples.
The above is just examples, and will not do anything except maybe trigger an error but I will provide a few examples of how these vulnerabilities could be exploited. First, there is an SQL Injection issue that occurs when emailing a thread to someone
Visiting a url like the one above by itself will not cause much to happen, but if you complete the form, you will notice an email arrives at the address you specified in the form, and the contents of that email are the contents you queried from the database! Also, in the private messaging feature there is another serious SQL Injection issue.
A url like the one above would yield the user 'foobar' s password hash and username.
Also, there are a few SQL Injection issues that require the post method. For example when rating a profile, or post, or anything else (they all use the same feature) you can specify arbitrary SQL statements to the "Main" parameter. Also, when conducting a search an attacker may specify arbitrary SQL statements in the "Forum" array and have them execute successfully with the privileges of the current mysql user.
Cross Site Request Forgery:
There are a number of CSRF issues in UBB Threads, and these issues allow for an attacker to unwillingly change their ignore, and address settings.
These issues really affect privacy on the forums, and make it nearly impossible to keep away from any harassing members :)
HTTP Response Splitting:
There are several HTTP Response Splitting issues in UBB Threads. These issues allow for an attacker to manipulate headers sent back to the user, and may allow for code execution in the context of the victims browser. The "Cat" parameter in the files toggleshow.php, togglecats.php, and showprofile.php are all vulnerable.
Local File Inclusion:
UBB Threads suffers from a local file inclusion vulnerability when handling language preferences extracted from the cookie. The "language" parameter is never sanitized and can thus be exploited by specifying an arbitrary file location appended with a null byte (%00). This could lead to code execution, or in most cases, file disclosure.
An updated version of UBB threads has been released to address the previously mentioned issues, and users are strongly advised to upgrade immediately.
Users can visit the above url to get information regarding UBB Threads security updates.
James Bercegay of the GulfTech Security Research Team