Versions Affected: 3.8.6 (Only!)
Info:
Content publishing, search, security, and more—vBulletin has it all. Whether
it’s available features, support, or ease-of-use, vBulletin offers the most for
your money. Learn more about what makes vBulletin the choice for people
who are serious about creating thriving online communities.
External Links:
http://www.vbulletin.com/
-:: The Advisory ::-
vBulletin is prone to information disclosure of the entire database
credentials used in config.php via the faq.php file.
By searching for "database" on a vulnerable installation of vBulletin
an attacker is shown the information mentioned above.
-:: Solution ::-
A patch is available from http://members.vbulletin.com
Alternatively, search for "database_ingo" in the Phrase Manager
within the Admin Control Panel, and delete or edit all critical details.
Disclosure Information:
- vBulletin Security Notice & Patch: 22nd July 2010
- Vulnerability Researched and Disclosed: 22nd July
Note:
After searching the Internet a bit I discovered that I wasn't the
only one which knew about this bug. Please note that I give full
credit to the rightful finder / owner of this exploit.
References:
http://forum.intern0t.net/exploits-vulnerabilities-pocs/2857-vbulletin-3-8-6-critical-information-disclosure.html
http://www.vbulletin.com/forum/showthread.php?357818-Security-Patch-Release-3.8.6-PL1
All of the best,
MaXe
{"id": "SECURITYVULNS:DOC:24296", "bulletinFamily": "software", "title": "vBulletin - Critical Information Disclosure", "description": "Versions Affected: 3.8.6 (Only!)\r\n\r\nInfo:\r\nContent publishing, search, security, and more\u2014vBulletin has it all. Whether\r\nit\u2019s available features, support, or ease-of-use, vBulletin offers the most for\r\nyour money. Learn more about what makes vBulletin the choice for people\r\nwho are serious about creating thriving online communities.\r\n\r\nExternal Links:\r\nhttp://www.vbulletin.com/\r\n\r\n\r\n-:: The Advisory ::-\r\nvBulletin is prone to information disclosure of the entire database\r\ncredentials used in config.php via the faq.php file.\r\n\r\nBy searching for "database" on a vulnerable installation of vBulletin\r\nan attacker is shown the information mentioned above.\r\n\r\n-:: Solution ::-\r\nA patch is available from http://members.vbulletin.com\r\n\r\nAlternatively, search for "database_ingo" in the Phrase Manager\r\nwithin the Admin Control Panel, and delete or edit all critical details.\r\n\r\n\r\nDisclosure Information:\r\n- vBulletin Security Notice & Patch: 22nd July 2010\r\n- Vulnerability Researched and Disclosed: 22nd July\r\n\r\nNote:\r\nAfter searching the Internet a bit I discovered that I wasn't the\r\nonly one which knew about this bug. Please note that I give full\r\ncredit to the rightful finder / owner of this exploit.\r\n\r\nReferences:\r\nhttp://forum.intern0t.net/exploits-vulnerabilities-pocs/2857-vbulletin-3-8-6-critical-information-disclosure.html\r\nhttp://www.vbulletin.com/forum/showthread.php?357818-Security-Patch-Release-3.8.6-PL1\r\n\r\n\r\n\r\nAll of the best,\r\nMaXe", "published": "2010-07-23T00:00:00", "modified": "2010-07-23T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:24296", "reporter": "Securityvulns", "references": [], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:10:35", "edition": 1, "viewCount": 57, "enchantments": {"score": {"value": -0.5, "vector": "NONE"}, "dependencies": {"references": [{"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:11011"]}], "rev": 4}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.5}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645672159, "score": 1659803227}, "_internal": {"score_hash": "464c8f48bf930e78bdc2cbf5a53b924d"}}