#VU38232 Input validation error in vBulletin


Published: 2017-09-19 | Updated: 2020-08-08

Vulnerability identifier: #VU38232

Vulnerability risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2015-3419

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
vBulletin
Web applications / Forum & blogging software

Vendor: vBulletin

Description

The vulnerability allows a remote authenticated user to manipulate data.

vBulletin 5.x through 5.1.6 allows remote authenticated users to bypass authorization checks and inject private messages into conversations via vectors related to an input validation failure.

Mitigation
Install update from vendor's website.

Vulnerable software versions

vBulletin: 5.0.0 - 5.1.6


External links
http://www.openwall.com/lists/oss-security/2015/04/24/4
http://www.vbulletin.com/forum/forum/vbulletin-announcements/vbulletin-announcements_aa/4319488-security-patch-released-for-vbulletin-5-1-4-5-1-6-and-vbulletin-cloud


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability