vBulletin < 5.6.7 Patch Level 1 / < 5.6.8 Patch Level 1 / < 5.6.9 Patch Level 1 Remote Code Execution

critical Web App Scanning Plugin ID 113569

Synopsis

vBulletin < 5.6.7 Patch Level 1 / < 5.6.8 Patch Level 1 / < 5.6.9 Patch Level 1 Remote Code Execution

Description

According to the self-reported version in its response header, the version of vBulletin hosted on the remote web server is < 5.6.7 Patch Level 1, < 5.6.8 Patch Level 1 or < 5.6.9 Patch Level 1. It is, therefore, affected by a Remote Code Execution via user[searchprefs] parameter within ajax/api/user/save endpoint.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to vBulletin version 5.6.9 Patch Level 1 or later.

See Also

https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4473890-vbulletin-5-6-9-security-patch

https://www.ambionics.io/blog/vbulletin-unserializable-but-unreachable

Plugin Details

Severity: Critical

ID: 113569

Type: remote

Published: 2/3/2023

Updated: 3/14/2023

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-25135

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2023-25135

Vulnerability Information

CPE: cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/3/2019

Vulnerability Publication Date: 10/3/2019

Reference Information

CVE: CVE-2023-25135