vendor:
vBulletin 5.x
by:
Anonymous
9.8
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: vBulletin 5.x
Affected Version From: 5.0.0
Affected Version To: 5.5.4
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: N/A
2020
vBulletin 5.x 0day pre-auth RCE exploit
This exploit allows an attacker to execute arbitrary code on a vulnerable vBulletin 5.x installation. It works on all versions from 5.0.0 till 5.5.4. The exploit is triggered by sending a specially crafted POST request to the vulnerable server, containing a payload in the 'widgetConfig[code]' parameter. The payload is then executed on the server.
Mitigation:
Upgrade to the latest version of vBulletin 5.x