vBulletin <= 3.0.9 Multiple Vulnerabilities

high Nessus Plugin ID 19760

Synopsis

The remote web server contains a PHP script that is vulnerable to several flaws.

Description

The version of vBulletin installed on the remote host fails to properly sanitize user-supplied input to a number of parameters and scripts before using it in database queries and to generate dynamic HTML. An attacker can exploit these issues to launch SQL injection and cross-site scripting attacks against the affected application. Note that the affected scripts require moderator or administrator access, with the exception of 'joinrequests.php'.

Solution

Upgrade to vBulletin 3.0.9 to resolve many but not all of these issues.

See Also

http://morph3us.org/advisories/20050917-vbulletin-3.0.8.txt

Plugin Details

Severity: High

ID: 19760

File Name: vbulletin_309.nasl

Version: 1.28

Type: remote

Family: CGI abuses

Published: 9/19/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2005-3019

CVSS v3

Risk Factor: High

Base Score: 8.3

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:jelsoft:vbulletin

Required KB Items: www/vBulletin

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 9/17/2005

Reference Information

CVE: CVE-2005-3019, CVE-2005-3020, CVE-2005-3024, CVE-2005-3025

BID: 14872, 14874

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990