PT-2019-6135 · Vbulletin Solutions · Vbulletin
I0Su9Z+32Fpome4Pivgiwtzjw
·
Published
2019-09-24
·
Updated
2025-11-29
·
CVE-2019-16759
CVSS v3.1
9.8
Critical
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
vBulletin versions 5.0.0 through 5.5.4
Description
The issue is related to errors in code generation management, allowing a remote attacker to execute arbitrary commands using a specially crafted
widgetConfig[code] parameter in an ajax/render/widget php routestring request. This can be done without authentication. The vulnerability affects many open projects, including forums for Ubuntu, openSUSE, BSD systems, and Slackware.Recommendations
For versions 5.0.0 through 5.5.4, consider disabling the
widget php function or restricting access to the ajax/render/widget php endpoint until a patch is available. Avoid using the widgetConfig[code] parameter in the affected API endpoint until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this vulnerability.Exploit
Code Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Vbulletin