WWWBoard doesn't have the tightest security. If you're using version 2.0 ALPHA 2, upgrade to ALPHA 2.1 to fix major security problems.
WWWBoard 2.0 ALPHA 2 did not validate the followup field. Attackers could:
Find lines 133-135 in the standard distribution (ALPHA 2.0):
if ($FORM{'followup'}) {
$followup = "1";
@followup_num = split(/,/,$FORM{'followup'});
Add the following code after those lines:
# Changes based in part on information contained in BugTraq archives
# message 'WWWBoard Vulnerability' posted by Samuel Sparling Nov-09-1998.
# Also requires that each followup number is in fact a number, to
# prevent message clobbering.
local(%fcheck);
foreach $fn (@followup_num) {
if ($fn !~ /^\d+$/ || $fcheck{$fn}) { &error('followup_data'); }
$fcheck{$fn} = 1;
}
@followup_num = keys %fcheck;
Another common attack is dictionary attacks against the well-known location of passwd.txt.
passwd.txt to a non-standard locationwwwadmin.pl accordinglyThis vulnerability was documented in the BugTraq security mailing list archives, posted by Samuel Sparling on November 9, 1998. It represents an important lesson in CGI security: always validate user input, especially when it affects file operations.