vendor:
vBulletin Yet Another Awards System
by:
Backsl@sh/Dan
7,5
CVSS
HIGH
Time Based SQL Injection
89
CWE
Product Name: vBulletin Yet Another Awards System
Affected Version From: 4.0.2+
Affected Version To: 4.0.2+
Patch Exists: YES
Related CWE: N/A
CPE: a:vbulletin:vbulletin_yet_another_awards_system
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2012
vBulletin Yet Another Awards System 4.0.2 Time Based SQL Injection 0day
The vulnerability exists within /request_award.php. The $award_request_uid is used within an insert into statement, unsanitized. The POC is http://[site].com/request_award.php with POST: do=submit&name=award_id=[VALID REWARD ID]&award_request_reason=0&award_request_uid=0[SQL]&submit=Submit
Mitigation:
Input validation should be used to prevent SQL injection attacks.