SQL injection in Forumrunner add-on in vBulletin - #VU158

 

SQL injection in Forumrunner add-on in vBulletin - #VU158

Published: July 18, 2016


Vulnerability identifier: #VU158
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: N/A
CWE-ID: CWE-89
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vendor: vBulletin
Affected software:
vBulletin

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary SQL queries in application’s database.

The vulnerability exists due to insufficient sanitization of input data in clean_gpc() and clean_array_gpc() functions in "/forumrunner/includes/moderation.php" script within in Forumrunner add-on, available by default in vBulletin installation. A remote unauthenticated attacker can tamper with SQL query and execute arbitrary SQL commands in application’s database.

Successful exploitation of this vulnerability will allow an attacker to read and modify records in application’s database and can lead to complete website compromise.

Update: reportedly this vulnerability was used to hack Ubuntu official forms on July 14, 2016.


Remediation

Install patches, provided by the vendor:

vBulletin 4.2.2 Patch Level 5
vBulletin 4.2.3 Patch Level 1

You can download the patch for your version here: http://members.vbulletin.com/patches.php


Sources