#VU9658 PHP code injection in vBulletin 

 

#VU9658 PHP code injection in vBulletin

Published: December 18, 2017 / Updated: June 2, 2020


Vulnerability identifier: #VU9658
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: N/A
CWE-ID: CWE-94
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
vBulletin
Software vendor:
vBulletin

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists in vBulletin installations on Windows OS due to the file inclusion vulnerability with parameter "routestring". A remote unauthenticated attacker can send a GET request to /index.php, inject malicious PHP code into a file on the server (e.g. access.log), “include” that file in the request and execute arbitrary PHP code.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Install update from vendor's website.

External links