Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
vBulletin 5.x RCE Vulnerability
Information
Severity
Severity
High
Family
Family
Web application abuses
CVSSv2 Base
CVSSv2 Base
7.5
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Solution Type
Solution Type
None Solution Available
Created
Created
3 years ago
Modified
Modified
3 years ago
Summary
vBulletin is prone to an unauthenticated remote code execution vulnerability.
Insight
Insight
It is possible to bypass the patch for CVE-2019-16759 and execute arbitrary code on the system as the user running vBulletin.
Affected Software
Affected Software
vBulleting version 5.x.
Detection Method
Detection Method
Sends a crafted HTTP POST request and checks the response.
Solution
Solution
No known solution is available as of 10th August, 2020. Information regarding this issue will be updated once solution details are available.