Multiple remote code execution vulnerabilities in vBulletin



Published: 2017-12-18 | Updated: 2020-06-02
Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2017-17672
CWE-ID CWE-94
CWE-502
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Public exploit code for vulnerability #2 is available.
Vulnerable software
Subscribe
vBulletin
Web applications / Forum & blogging software

Vendor vBulletin

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) PHP code injection

EUVDB-ID: #VU9658

Risk: High

CVSSv3.1: 9.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:U/RC:C]

CVE-ID: N/A

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists in vBulletin installations on Windows OS due to the file inclusion vulnerability with parameter "routestring". A remote unauthenticated attacker can send a GET request to /index.php, inject malicious PHP code into a file on the server (e.g. access.log), “include” that file in the request and execute arbitrary PHP code.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Install update from vendor's website.

Vulnerable software versions

vBulletin: 5.3.0 - 5.3.4

External links

http://blogs.securiteam.com/index.php/archives/3569
http://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4383554-security-patch-released-for-vbulletin-5-3-2-5-3-3-and-5-3-4


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

2) Deserialization of untrusted data

EUVDB-ID: #VU9659

Risk: High

CVSSv3.1: 9.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:U/RC:C]

CVE-ID: CVE-2017-17672

CWE-ID: CWE-502 - Deserialization of Untrusted Data

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to unsafe usage of PHP’s unserialize() on user-supplied input. A remote attacker can trigger a flaw in vB_Library_Template’s cacheTemplates() function, fetch information on a set of given templates from the database in order to store them inside a cache variable, delete arbitrary files and execute arbitrary code on a vBulletin installation.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Install update from vendor's website.

Vulnerable software versions

vBulletin: 5.3.0 - 5.3.4

External links

http://blogs.securiteam.com/index.php/archives/3573
http://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4383554-security-patch-released-for-vbulletin-5-3-2-5-3-3-and-5-3-4


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###