#VU158 SQL injection in Forumrunner add-on in vBulletin 

 

#VU158 SQL injection in Forumrunner add-on in vBulletin

Published: July 18, 2016


Vulnerability identifier: #VU158
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: N/A
CWE-ID: CWE-89
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vulnerable software:
vBulletin
Software vendor:
vBulletin

Description

The vulnerability allows a remote attacker to execute arbitrary SQL queries in application’s database.

The vulnerability exists due to insufficient sanitization of input data in clean_gpc() and clean_array_gpc() functions in "/forumrunner/includes/moderation.php" script within in Forumrunner add-on, available by default in vBulletin installation. A remote unauthenticated attacker can tamper with SQL query and execute arbitrary SQL commands in application’s database.

Successful exploitation of this vulnerability will allow an attacker to read and modify records in application’s database and can lead to complete website compromise.

Update: reportedly this vulnerability was used to hack Ubuntu official forms on July 14, 2016.


Remediation

Install patches, provided by the vendor:

vBulletin 4.2.2 Patch Level 5
vBulletin 4.2.3 Patch Level 1

You can download the patch for your version here: http://members.vbulletin.com/patches.php


External links