vBulletin < 5.5.6 Patch Level 1 / 5.6.0 < 5.6.0 Patch Level 1 / 5.6.1 < 5.6.1 Patch Level 1 SQL Injection Vulnerability

critical Web App Scanning Plugin ID 112440

Synopsis

vBulletin < 5.5.6 Patch Level 1 / 5.6.0 < 5.6.0 Patch Level 1 / 5.6.1 < 5.6.1 Patch Level 1 SQL Injection Vulnerability

Description

vBulletin is a popular PHP forum software used to build online communities. vBulletin versions before 5.5.6 Patch Level 1, version 5.6.0 before 5.6.0 Patch Level 1 and version 5.6.1 before 5.6.1 Patch Level 1 suffer from a SQL injection vulnerability through the 'nodeId' parameter in the getIndexableContent ajax function. A remote, unauthenticated attacker can exploit this issue to takeover the forum administrator account and achieve remote code execution on the target host.

Solution

Upgrade at least to version 5.6.1 Patch Level 1 for version 5.6.1, to version 5.6.0 Patch Level 1 for version 5.6.0 and to version 5.5.6 Patch Level 1 for versions below.

See Also

https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4440032-vbulletin-5-5-6-5-6-0-5-6-1-security-patch-level-1

https://packetstormsecurity.com/files/157716/vBulletin-5.6.1-SQL-Injection.html

https://www.vbulletin.com/docs/html/main/upgrade_patch_level

Plugin Details

Severity: Critical

ID: 112440

Type: remote

Published: 6/10/2020

Updated: 9/7/2021

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2020-12720

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2020-12720

Vulnerability Information

CPE: cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2020-12720