Invision Power Board unspecified code execution
|invision-unspecified-code-execution (26541)||Medium Risk|
Invision Power Board could allow a remote attacker to gain access and possibly execute PHP code. A remote attacker could send a specially-crafted URL request to unspecified scripts and parameters using a POST or GET request, which could allow the attacker to execute arbitrary code on the vulnerable system.
Note: Moderator access is required to execute code for one of the two vulnerable areas.
For Invision Power Board 2.1.6:
Upgrade your system with the current Update Package of Invision Power Board (21012.60501 to 21012.60516 or later) available from the Invision Power Services Web site. See References.
For Invision Power Board 2.0.4:
Upgrade your system with the current Update Package of Invision Power Board (20014.00000 to 20014.60516 or later) available from the Invision Power Services Web site. See References.
- Invision Power Services Web site: Invision Power Services: Invision Blog.
- IPB 2.x.x Security Update (06-05-16): IPB 2.x.x Security Update (06-05-16).
- BID-18040: Invision Power Board Multiple Arbitrary PHP Code Execution Vulnerabilities
- CVE-2006-2498: Invision Power Board (IPB) before 2.1.6 allows remote attackers to execute arbitrary PHP script via attack vectors involving (1) the post_icon variable in classes/post/class_post.php and (2) the df value in action_public/moderate.php.
- OSVDB ID: 25667: Invision Power Board moderate.php Arbitrary Code Execution
- OSVDB ID: 25668: Invision Power Board class_post.php Arbitrary Code Execution
- SA20158: Invision Power Board Multiple Vulnerabilities
- Invision Power Invision Power Board 2.0.4
- Invision Power Invision Power Board 2.1.6
May 17, 2006
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this