---------------------------------------------------------------------- Secunia CSI + Microsoft SCCM ----------------------- = Extensive Patch Management http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: MyBB Multiple Vulnerabilities SECUNIA ADVISORY ID: SA39378 VERIFY ADVISORY: http://secunia.com/advisories/39378/ DESCRIPTION: Some vulnerabilities have been reported in MyBB, which can be exploited by malicious people to conduct cross-site request forgery attacks and bypass certain security restrictions. 1) The password reset functionality relies on an insecure random number generator to create password reset tokens. This can potentially be exploited to guess a generated token or password. Note: Successful exploitation may require that PHP processes are reused by the webserver. 2) Certain input passed via the URL to the password reset functionality is not properly sanitised before being used, which can be exploited to e.g. inject a "BCC:" header to the password reset email by tricking a user into following a specially crafted link. 3) The application allows users to perform certain actions via HTTP requests, without performing any validity checks to verify the request. This can be exploited by tricking a user into visiting a malicious site. SOLUTION: Update to version 1.4.12. PROVIDED AND/OR DISCOVERED BY: 1, 2) Stefan Esser 3) Labrocca ORIGINAL ADVISORY: http://blog.mybboard.net/2010/04/13/mybb-1-4-12-released-security-maintenance-update/ 1) http://www.sektioneins.com/en/advisories/advisory-022010-mybb-password-reset-weak-random-numbers-vulnerability/ 2) http://www.sektioneins.com/en/advisories/advisory-012010-mybb-password-reset-email-bcc-injection-vulnerability/ 3) http://dev.mybboard.net/issues/852 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------