#VU21600 PHP Code Injection in vBulletin - CVE-2019-17132

 

#VU21600 PHP Code Injection in vBulletin - CVE-2019-17132

Published: October 8, 2019 / Updated: June 17, 2021


Vulnerability identifier: #VU21600
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: CVE-2019-17132
CWE-ID: CWE-94
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
vBulletin
Software vendor:
vBulletin

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation in the " ajax/api/user/updateAvatar" endpoint when processing data passed via the "data[filedata" HTTP POST parameter. A remote authenticated attacker can send a specially crafted request to the Avatar update script and execute arbitrary PHP code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links