Описание
vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitMailing ListThird Party Advisory
- ExploitPress/Media CoverageThird Party Advisory
- ExploitMailing ListThird Party Advisory
- Press/Media CoverageThird Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitMailing ListThird Party Advisory
- ExploitPress/Media CoverageThird Party Advisory
- ExploitMailing ListThird Party Advisory
- Press/Media CoverageThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 5.0.0 (включая) до 5.5.4 (включая)
cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:*
EPSS
Процентиль: 100%
0.94407
Критический
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-94
CWE-94
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request.
CVSS3: 9.8
fstec
больше 6 лет назад
Уязвимость коммерческого веб-форума vBulletin, связанная с ошибками управления генерацией кода, позволяющая нарушителю выполнить произвольные команды
EPSS
Процентиль: 100%
0.94407
Критический
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-94
CWE-94