vBulletin 5.x <= 5.5.4 RCE Vulnerability

Published: 2019-09-25 04:05:17
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Detection Type:
exploit

Solution Type:
None Available

Summary:
vBulletin is prone to an unauthenticated remote code execution vulnerability.

Detection Method:
Sends a crafted HTTP POST request and checks the response.

Impact:
An unauthenticated attacker may execute arbitrary code on the system as the user running vBulletin.

Affected Versions:
vBulletin versions 5.x.x.

Recommendations:
No known solution is available as of 25th September, 2019. Information regarding this issue will be updated once solution details are available.

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-16759

References:

https://seclists.org/fulldisclosure/2019/Sep/31

Search
Severity
High
CVSS Score
7.5

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.