COMMAND

    Yabb

SYSTEMS AFFECTED

    Yabb

PROBLEM

    Kosak found following.  There is an input validation problem  with
    the  'catsearch'  field,  which  gets  interpolated  in  an   open
    statement:

        open(FILE, "$boardsdir/$cattosearch") || &fatal_error("$txt{'23'}
        $currentboard.txt");

    where $cattosearch is a localized $catsearch, assigned:

        $catsearch = $FORM{'catsearch'};

    An  attacker  could  easily  create  a  malicious html form with a
    catsearch such as:

        ./../../../../../usr/bin/touch%20/tmp/foo|

    The amount  of directory  traversal will  vary from  site to site,
    depending on their YaBB setup.

SOLUTION

    Nothing yet.