Two Critical Vulnerabilities Uncovered in vBulletin

Inside the framework of the Beyond Security's SecuriTeam Secure Disclosure program, subtle elements were uncovered around two basic vulnerabilities in the vBulletin that were found by the masters of the Italian organisation TRUEL IT and an autonomous master who made a request to stay mysterious. No less than one of the issues enables a remote assailant to execute subjective code with regards to the vBulletin application server. 











In spite of the fact that the issues influence promptly the last five forms of vBulletin, there are no revisions for them yet. Beyond Security said that they are endeavoring to contact the engineers of vBulletin from the end of November 2017, however they didn't get a reaction from the organization. Delegates of vBulletin told the media that they didn't get any letters identified with the depicted issues, and are as of now dealing with making patches. 

The main issue is depicted as a bug identified with the consideration of documents (record incorporation). The helplessness reaches out to the vBulletin introduced on Windows servers. An unauthenticated assailant can abuse a bug by sending a uniquely arranged GET ask for to index.php. Thus, an assailant will have the capacity to infuse noxious PHP code into a document on the server (for instance, in access.log), and after that "incorporate" this record by controlling the parameter routestring = in the question. Therefore, the aggressor's code will be executed. 

The second issue is CVE-2017-17672. This issue is related with deserialization and can be utilized both for erasing self-assertive documents, and for executing self-assertive code "in specific situations". 

For the two issues, point by point specialized subtle elements were distributed, as well as verification of-idea abuses.
Next Post Previous Post