#VU9658 PHP code injection in vBulletin
Published: December 18, 2017 / Updated: June 2, 2020
Vulnerability identifier: #VU9658
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: N/A
CWE-ID: CWE-94
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
vBulletin
vBulletin
Software vendor:
vBulletin
vBulletin
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in vBulletin installations on Windows OS due to the file inclusion vulnerability with parameter "routestring". A remote unauthenticated attacker can send a GET request to /index.php, inject malicious PHP code into a file on the server (e.g. access.log), “include” that file in the request and execute arbitrary PHP code.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists in vBulletin installations on Windows OS due to the file inclusion vulnerability with parameter "routestring". A remote unauthenticated attacker can send a GET request to /index.php, inject malicious PHP code into a file on the server (e.g. access.log), “include” that file in the request and execute arbitrary PHP code.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.