This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Vbulletin First view 2008-05-27
Product Vbulletin Last view 2020-05-08
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:vbulletin:vbulletin:3.6.10:*:*:*:*:*:*:* 17
cpe:2.3:a:vbulletin:vbulletin:3.7.1:*:*:*:*:*:*:* 17
cpe:2.3:a:vbulletin:vbulletin:3.6.7:*:*:*:*:*:*:* 17
cpe:2.3:a:vbulletin:vbulletin:3.6:*:*:*:*:*:*:* 17
cpe:2.3:a:vbulletin:vbulletin:4.2.2:*:*:*:*:*:*:* 17
cpe:2.3:a:vbulletin:vbulletin:3.8.7:*:*:*:*:*:*:* 17
cpe:2.3:a:vbulletin:vbulletin:3.7.0:gold:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.7.2:*:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.6.1:*:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.6.3:*:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.6.8:*:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.7.1:pl1:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.7.1:gold:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.6.4:*:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.6.9:*:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.6.6:*:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.6.2:*:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.6.10:pl1:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.6.5:*:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.7.0:*:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.6.10:pl3:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.7.2:pl1:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.7.4:*:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.7.3:pl1:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:4.1:*:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.8.8:*:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.8.9:*:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:3.5.4:*:*:*:*:*:*:* 16
cpe:2.3:a:vbulletin:vbulletin:4.1.12:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:4.1.10:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:4.0.7:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:4.0.6:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:4.0.4:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:4.0.0:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:4.0.8:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:4.0.2:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:4.0.5:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:4.1.3:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:4.1.2:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:4.1.1:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:4.0.1:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:4.0.3:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:4.2.1:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:3.0:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:3.5:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:3.7:*:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:3.0.0:-:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:3.0.0:beta3:*:*:*:*:*:* 15
cpe:2.3:a:vbulletin:vbulletin:3.0.0:rc2:*:*:*:*:*:* 15

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
9.8 2020-05-08 CVE-2020-12720

vBulletin before 5.5.6pl1, 5.6.0 before 5.6.0pl1, and 5.6.1 before 5.6.1pl1 has incorrect access control.

4.9 2019-10-08 CVE-2019-17271

vBulletin 5.5.4 allows SQL Injection via the ajax/api/hook/getHookList or ajax/api/widget/getWidgetList where parameter.

9.8 2019-10-04 CVE-2019-17132

vBulletin through 5.5.4 mishandles custom avatars.

4.3 2019-10-04 CVE-2019-17131

vBulletin before 5.5.4 allows clickjacking.

6.5 2019-10-04 CVE-2019-17130

vBulletin through 5.5.4 mishandles external URLs within the /core/vb/vurl.php file and the /core/vb/vurl directories.

9.8 2019-09-24 CVE-2019-16759

vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request.

6.1 2018-10-17 CVE-2018-15493

vBulletin 5.4.3 has an Open Redirect.

6.1 2018-01-24 CVE-2018-6200

vBulletin 3.x.x and 4.2.x through 4.2.5 has an open redirect via the redirector.php url parameter.

9.8 2017-12-13 CVE-2017-17672

In vBulletin through 5.3.x, there is an unauthenticated deserialization vulnerability that leads to arbitrary file deletion and, under certain circumstances, code execution, because of unsafe usage of PHP's unserialize() in vB_Library_Template's cacheTemplates() function, which is a publicly exposed API. This is exploited with the templateidlist parameter to ajax/api/template/cacheTemplates.

9.8 2017-12-13 CVE-2017-17671

vBulletin through 5.3.x on Windows allows remote PHP code execution because a require_once call is reachable with an unauthenticated request that can include directory traversal sequences to specify an arbitrary pathname, and because ../ traversal is blocked but ..\ traversal is not blocked. For example, an attacker can make an invalid HTTP request containing PHP code, and then make an index.php?routestring= request with enough instances of ".." to reach an Apache HTTP Server log file.

6.5 2017-09-19 CVE-2015-3419

vBulletin 5.x through 5.1.6 allows remote authenticated users to bypass authorization checks and inject private messages into conversations via vectors related to an input validation failure.

8.8 2017-09-15 CVE-2014-9463

functions_vbseo_hook.php in the VBSEO module for vBulletin allows remote authenticated users to execute arbitrary code via the HTTP Referer header to visitormessage.php.

6.1 2017-08-28 CVE-2014-9469

Cross-site scripting (XSS) vulnerability in vBulletin 3.5.4, 3.6.0, 3.6.7, 3.8.7, 4.2.2, 5.0.5, and 5.1.3.

8.6 2017-04-06 CVE-2017-7569

In vBulletin before 5.3.0, remote attackers can bypass the CVE-2016-6483 patch and conduct SSRF attacks by leveraging the behavior of the PHP parse_url function, aka VBV-17037.

8.6 2016-09-01 CVE-2016-6483

The media-file upload feature in vBulletin before 3.8.7 Patch Level 6, 3.8.8 before Patch Level 2, 3.8.9 before Patch Level 1, 4.x before 4.2.2 Patch Level 6, 4.2.3 before Patch Level 2, 5.x before 5.2.0 Patch Level 3, 5.2.1 before Patch Level 1, and 5.2.2 before Patch Level 1 allows remote attackers to conduct SSRF attacks via a crafted URL that results in a Redirection HTTP status code.

9.8 2016-08-30 CVE-2016-6195

SQL injection vulnerability in forumrunner/includes/moderation.php in vBulletin before 4.2.2 Patch Level 5 and 4.2.3 before Patch Level 1 allows remote attackers to execute arbitrary SQL commands via the postids parameter to forumrunner/request.php, as exploited in the wild in July 2016.

7.5 2015-11-24 CVE-2015-7808

The vB_Api_Hook::decodeArguments method in vBulletin 5 Connect 5.1.2 through 5.1.9 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object in the arguments parameter to ajax/api/hook/decodeArguments.

6.8 2015-01-02 CVE-2014-9438

Cross-site request forgery (CSRF) vulnerability in the Moderator Control Panel in vBulletin 4.2.2 allows remote attackers to hijack the authentication of administrators for requests that (1) ban a user via the username parameter in a dobanuser action to modcp/banning.php or (2) unban a user, (3) modify user profiles, edit a (4) post or (5) topic, or approve a (6) post or (7) topic via unspecified vectors.

5.8 2014-11-06 CVE-2014-8670

Open redirect vulnerability in go.php in vBulletin 4.2.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter.

3.5 2014-10-24 CVE-2014-2021

Cross-site scripting (XSS) vulnerability in admincp/apilog.php in vBulletin 4.2.2 and earlier, and 5.0.x through 5.0.5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted XMLRPC API request, as demonstrated using the client name.

7.1 2014-10-15 CVE-2014-2022

SQL injection vulnerability in includes/api/4/breadcrumbs_create.php in vBulletin 4.2.2, 4.2.1, 4.2.0 PL2, and earlier allows remote authenticated users to execute arbitrary SQL commands via the conceptid argument in an xmlrpc API request.

7.5 2014-07-25 CVE-2014-5102

SQL injection vulnerability in vBulletin 5.0.4 through 5.1.3 Alpha 5 allows remote attackers to execute arbitrary SQL commands via the criteria[startswith] parameter to ajax/render/memberlist_items.

4.3 2014-04-30 CVE-2014-3135

Multiple cross-site scripting (XSS) vulnerabilities in vBulletin 5.1.1 Alpha 9 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to privatemessage/new/, (2) the folderid parameter to a private message in privatemessage/view, (3) a fragment indicator to /help, or (4) the view parameter to a topic, as demonstrated by a request to forum/anunturi-importante/rst-power/67030-rst-admin-restore.

7.5 2013-10-19 CVE-2013-6129

The install/upgrade.php scripts in vBulletin 4.1 and 5 allow remote attackers to create administrative accounts via the customerid, htmldata[password], htmldata[confirmpassword], and htmldata[email] parameters, as exploited in the wild in October 2013.

6.5 2013-05-10 CVE-2013-3522

SQL injection vulnerability in index.php/ajax/api/reputation/vote in vBulletin 5.0.0 Beta 11, 5.0.0 Beta 28, and earlier allows remote authenticated users to execute arbitrary SQL commands via the nodeid parameter.

CWE : Common Weakness Enumeration

%idName
31% (9) CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('...
24% (7) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
17% (5) CWE-20 Improper Input Validation
6% (2) CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
3% (1) CWE-552 Files or Directories Accessible to External Parties
3% (1) CWE-502 Deserialization of Untrusted Data
3% (1) CWE-352 Cross-Site Request Forgery (CSRF)
3% (1) CWE-264 Permissions, Privileges, and Access Controls
3% (1) CWE-94 Failure to Control Generation of Code ('Code Injection')
3% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-63 Simple Script Injection
CAPEC-73 User-Controlled Filename
CAPEC-81 Web Logs Tampering
CAPEC-85 Client Network Footprinting (using AJAX/XSS)
CAPEC-86 Embedding Script (XSS ) in HTTP Headers
CAPEC-104 Cross Zone Scripting

SAINT Exploits

Description Link
vBulletin remote command execution via the widgetConfig[code] parameter More info here
vBulletin decodeArguments serialized object vulnerability More info here

Open Source Vulnerability Database (OSVDB)

id Description
52279 vBulletin admincp/image.php iperm Parameter SQL Injection
49921 vBulletin admincp/attachmentpermission.php extension Parameter SQL Injection
49920 vBulletin admincp/verify.php answer Parameter SQL Injection
49907 vBulletin admincp/admincalendar.php holidayinfo[recurring] Parameter SQL Inje...
47591 vBulletin Private Message Subject Field XSS
46937 vBulletin Debug Mode Unspecified XSS
46936 vBulletin admincp/faq.php Injection adminlog.php XSS
46185 vBulletin Unspecified XSS
45736 vBulletin faq.php q Parameter SQL Injection

OpenVAS Exploits

id Description
2009-03-10 Name : vBulletin 'admincalendar.php' SQL Injection Vulnerability
File : nvt/vBulletin_3_7_3_pl1_sql_injection.nasl
2009-03-10 Name : VBulletin 3.7.4 multiple SQL Injection Vulnerability
File : nvt/vBulletin_3_7_4_multiple_sql_injection.nasl

Snort® IPS/IDS

Date Description
2019-11-15 vBulletin pre-authenticated command injection attempt
RuleID : 51837 - Type : SERVER-WEBAPP - Revision : 2
2019-11-15 vBulletin pre-authenticated command injection attempt
RuleID : 51836 - Type : SERVER-WEBAPP - Revision : 2
2019-11-15 vBulletin pre-authenticated command injection attempt
RuleID : 51835 - Type : SERVER-WEBAPP - Revision : 2
2019-11-15 vBulletin pre-authenticated command injection attempt
RuleID : 51834 - Type : SERVER-WEBAPP - Revision : 2
2019-11-15 vBulletin pre-authenticated command injection attempt
RuleID : 51833 - Type : SERVER-WEBAPP - Revision : 2
2019-11-12 vBulletin updateAvatar PHP remote code execution attempt
RuleID : 51818 - Type : SERVER-WEBAPP - Revision : 1
2019-11-12 vBulletin updateAvatar PHP remote code execution attempt
RuleID : 51817 - Type : SERVER-WEBAPP - Revision : 1
2019-11-12 vBulletin updateAvatar PHP remote code execution attempt
RuleID : 51816 - Type : SERVER-WEBAPP - Revision : 1
2019-11-12 vBulletin SQL injection attempt
RuleID : 51813 - Type : SERVER-WEBAPP - Revision : 1
2019-11-12 vBulletin SQL injection attempt
RuleID : 51812 - Type : SERVER-WEBAPP - Revision : 1
2019-11-12 vBulletin SQL injection attempt
RuleID : 51811 - Type : SERVER-WEBAPP - Revision : 1
2019-11-12 vBulletin SQL injection attempt
RuleID : 51810 - Type : SERVER-WEBAPP - Revision : 1
2019-11-12 vBulletin SQL injection attempt
RuleID : 51809 - Type : SERVER-WEBAPP - Revision : 1
2019-11-12 vBulletin SQL injection attempt
RuleID : 51808 - Type : SERVER-WEBAPP - Revision : 1
2019-10-29 vBulletin pre-authenticated command injection attempt
RuleID : 51621 - Type : SERVER-WEBAPP - Revision : 3
2019-10-29 vBulletin pre-authenticated command injection attempt
RuleID : 51620 - Type : SERVER-WEBAPP - Revision : 3
2016-03-14 vBulletin decodeArguments PHP object injection attempt
RuleID : 36763 - Type : SERVER-WEBAPP - Revision : 2