#VU21323 OS Command Injection in vBulletin - CVE-2019-16759

 

#VU21323 OS Command Injection in vBulletin - CVE-2019-16759

Published: September 25, 2019 / Updated: June 17, 2021


Vulnerability identifier: #VU21323
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2019-16759
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vulnerable software:
vBulletin
Software vendor:
vBulletin

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in "ajax/render/widget_php" when processing data passed via the "widgetConfig[code]" HTTP POST parameter. A remote unauthenticated attacker can send specially crafted HTTP POST request to the affected application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note: The vulnerability is being actively exploited in the wild.


Remediation

Install updates from vendor's website.

External links