|
|||
Rule General Information |
---|
Release Date: | 2019-10-14 | |
Rule Name: | vBulletin 5.x Unauthenticated Remote Code Execution Vulnerability -1 (CVE-2019-16759) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request. | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Others | |
Reference: | http://packetstormsecurity.com/files/154623/vBulletin-5.x-0-Day-Pre-Auth-Remote-Command-Execution.html http://packetstormsecurity.com/files/154648/vBulletin-5.x-Pre-Auth-Remote-Code-Execution.html https://arstechnica.com/information-technology/2019/09/public-exploit-code-spawns-mass-attacks-against-high-severity-vbulletin-bug/ https://seclists.org/fulldisclosure/2019/Sep/31 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://www.vbulletin.com |