diff --git a/http/vulnerabilities/vbulletin/vbulletin-search-sqli.yaml b/http/vulnerabilities/vbulletin/vbulletin-search-sqli.yaml index 7315e6d64d..0f04a11723 100644 --- a/http/vulnerabilities/vbulletin/vbulletin-search-sqli.yaml +++ b/http/vulnerabilities/vbulletin/vbulletin-search-sqli.yaml @@ -1,18 +1,20 @@ id: vbulletin-search-sqli + info: - name: vBulletin Search.php SQL Injection + name: vBulletin `Search.php` - SQL Injection author: MaStErChO severity: high description: | vBulletin 4 is vulnerable to an SQL injection vulnerability, which may allow an attacker can execute malicious SQL statements that control a web application's database server. + remediation: Upgrade to the latest version of vBulletin. reference: - https://www.exploit-db.com/exploits/17314 - https://web.archive.org/web/20181129123620/https://j0hnx3r.org/vbulletin-4-x-sql-injection-vulnerability/ - tags: vbulletin, ajaxreg, sql-injection metadata: + verified: true max-request: 1 shodan-query: http.component:"vBulletin" - + tags: vbulletin,ajaxreg,sqli http: - raw: @@ -29,9 +31,11 @@ http: part: body words: - "type=dberror" + - "MySQL Error" + condition: and - type: status status: - 200 - 503 - condition: or \ No newline at end of file + condition: or