Lucene search

K

vbulletin306.txt

๐Ÿ—“๏ธย 26 Feb 2005ย 00:00:00Reported byย PokleyzzTypeย 
packetstorm
ย packetstorm
๐Ÿ”—ย packetstormsecurity.com๐Ÿ‘ย 26ย Views

vBulletin 3.0.6 allows PHP code injection via template names; disable HTML Comments option.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Summary: vbulletin 3.0.6 and below php code injection  
  
Description  
===========  
vBulletin is a powerful, scalable and fully customizable forums package   
for your web site. It has been written using the Web's quickest-growing   
scripting language; PHP, and is complimented with a highly efficient and   
ultra fast back-end database engine built using MySQL.  
  
Details  
=======  
User may inject php code using "nested variable" into template name when   
"Add Template Name in HTML Comments" is enable. This option is not enable   
by default and is not recomended by vbulletin for production environment.   
The problem occur when user may supply partial template name through   
misc.php.  
  
  
Workaround  
==========  
Disable "Add Template Name in HTML Comments" option.  
  
Proof of concept  
================  
http://site.com/misc.php?do=page&template={${phpinfo()}}  
  
Vendor Response  
===============  
17th February 2005 - Vulnerability found  
18th February 2005 - vbulletin developer informed  
19th February 2005 - vbulletin developer confirmed  
20th February 2005 - Fix Available from vbulletin team  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
26 Feb 2005 00:00Current
7.4High risk
Vulners AI Score7.4
26
.json
Report