PHP code injection in vBulletin - #VU9658
Published: December 18, 2017 / Updated: June 2, 2020
Vulnerability identifier: #VU9658
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: N/A
CWE-ID: CWE-94
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: vBulletin
Affected software:
vBulletin
vBulletin
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in vBulletin installations on Windows OS due to the file inclusion vulnerability with parameter "routestring". A remote unauthenticated attacker can send a GET request to /index.php, inject malicious PHP code into a file on the server (e.g. access.log), “include” that file in the request and execute arbitrary PHP code.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists in vBulletin installations on Windows OS due to the file inclusion vulnerability with parameter "routestring". A remote unauthenticated attacker can send a GET request to /index.php, inject malicious PHP code into a file on the server (e.g. access.log), “include” that file in the request and execute arbitrary PHP code.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.