Frequently asked questions about the WWWBoard message board script.
To set up WWWBoard:
wwwboard.pl
wwwadmin.pl
mkdir /home/user/public_html/wwwboard/
chmod 755 wwwboard/
wwwboard.html
post.html
reply.html
chmod 755 wwwboard.pl wwwadmin.pl
chmod 666 *.html (in wwwboard directory)
To delete messages from WWWBoard:
http://yourdomain.com/cgi-bin/wwwadmin.pl
Or manually via FTP:
DBasics Software offered several add-ons with free installation guides for WWWBoard users.
DBasics Software offered the following add-ons for WWWBoard:
Several techniques help prevent spam on WWWBoard:
@banned_words = ("viagra", "casino", "cheap");
@blocked_ips = ("123.45.67.89");
WWWBoard doesn't have the tightest security. If you're using version 2.0 ALPHA 2, upgrade to ALPHA 2.1 to fix major security problems.
WWWBoard 2.0 ALPHA 2 did not validate the followup field. Attackers could:
Find lines 133-135 in the standard distribution (ALPHA 2.0):
if ($FORM{'followup'}) {
$followup = "1";
@followup_num = split(/,/,$FORM{'followup'});
Add the following code after those lines:
# Changes based in part on information contained in BugTraq archives
# message 'WWWBoard Vulnerability' posted by Samuel Sparling Nov-09-1998.
# Also requires that each followup number is in fact a number, to
# prevent message clobbering.
local(%fcheck);
foreach $fn (@followup_num) {
if ($fn !~ /^\d+$/ || $fcheck{$fn}) { &error('followup_data'); }
$fcheck{$fn} = 1;
}
@followup_num = keys %fcheck;
Another common attack is dictionary attacks against the well-known location of passwd.txt.
passwd.txt to a non-standard locationwwwadmin.pl accordinglyThis vulnerability was documented in the BugTraq security mailing list archives, posted by Samuel Sparling on November 9, 1998. It represents an important lesson in CGI security: always validate user input, especially when it affects file operations.