Security News > 2020 > August > vBulletin Patches Zero-Day Exploited in Attacks

vBulletin Patches Zero-Day Exploited in Attacks
2020-08-11 14:40

vBulletin developers on Monday rushed to address a zero-day remote code execution vulnerability in the forum software, one day after the issue was publicly disclosed.

On Sunday, security researcher Amir Etemadieh published information on a new vulnerability in vBulletin, explaining how it can be abused to bypass the patch released in September 2019 for CVE-2019-16759, and also providing proof-of-concept code that demonstrates how easily the flaw can be exploited.

Etemadieh, who identified other severe vulnerabilities in vBulletin before, did not contact vBulletin prior to disclosing the new vulnerability, which does not have a CVE identifier yet.

On Monday, vBulletin announced that patches were available for the 5.6.0, 5.6.1, and 5.6.2 versions of vBulletin Connect.

"All older versions should be considered vulnerable. Sites running older versions of vBulletin need to be upgraded to vBulletin 5.6.2 as soon as possible," vBulletin said.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/v3MzQ4Tc24M/vbulletin-patches-zero-day-exploited-attacks

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2019-09-24 CVE-2019-16759 Code Injection vulnerability in Vbulletin
vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request.
network
low complexity
vbulletin CWE-94
critical
9.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Vbulletin 1 0 18 2 9 29