vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request.
This indicates an attack attempt to exploit a Remote Command Execution Vulnerability in vBulletin.The vulnerability is due to an input validation error while parsing a HTTP request in the vulnerable module. A remote attacker could exploit this to execute arbitrary code execution within the context of the application, via a crafted HTTP request.
vBulletin Version 5
System Compromise: Remote attackers can gain control of vulnerable systems.
Currently, we are not aware of any vendor supplied patch for this issue.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag:
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
tehtris | https://tehtris.com/fr/blog/notre-selection-des-alertes-de-... | Source tehtris 1630171061323984896 | 2023/02/27 |
tehtris | https://twitter.com/tehtris/status/1630171061323984896/photo/1 | Source tehtris 1630171061323984896 | 2023/02/27 |
tehtris | https://tehtris.com/en/blog/our-selection-of-alerts-on-hone... | Source tehtris 1630172871992524800 | 2023/02/27 |
tehtris | https://twitter.com/tehtris/status/1630172871992524800/photo/1 | Source tehtris 1630172871992524800 | 2023/02/27 |
tehtris | https://tehtris.com/en/blog/our-selection-of-alerts-on-hone... | Source tehtris 1630189582431014912 | 2023/02/27 |
tehtris | https://twitter.com/tehtris/status/1630189582431014912/photo/1 | Source tehtris 1630189582431014912 | 2023/02/27 |
tehtris | https://tehtris.com/fr/blog/notre-selection-des-alertes-de-... | Source tehtris 1630190122992820224 | 2023/02/27 |
tehtris | https://twitter.com/tehtris/status/1630190122992820224/photo/1 | Source tehtris 1630190122992820224 | 2023/02/27 |
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
alerts.vulmon.com | 251 |
www.ipa.go.jp | 6 |
twitter.com | 4 |
scan.netsecurity.ne.jp | 4 |
www.helpnetsecurity.com | 4 |
github.com | 3 |
blog.exploitee.rs | 3 |
www.trustwave.com | 3 |
User | URL | Info Source |
---|---|---|
tehtris | tehtris.com | Show Tweet |
tehtris | twitter.com | Show Tweet |
tehtris | tehtris.com | Show Tweet |
tehtris | twitter.com | Show Tweet |
tehtris | tehtris.com | Show Tweet |
tehtris | twitter.com | Show Tweet |
tehtris | tehtris.com | Show Tweet |
tehtris | twitter.com | Show Tweet |
Name | URL |
---|---|
jas502n/CVE-2019-16759 | https://github.com/jas502n/CVE-2019-16759 |
M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit | https://github.com/M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit |
theLSA/vbulletin5-rce | https://github.com/theLSA/vbulletin5-rce |
mas1337/CVE-2019-16759 | https://github.com/mas1337/CVE-2019-16759 |
FarjaalAhmad/CVE-2019-16759 | https://github.com/FarjaalAhmad/CVE-2019-16759 |
r00tpgp/http-vuln-CVE-2019-16759 | https://github.com/r00tpgp/http-vuln-CVE-2019-16759 |
apidotmy/CVE-2019-16759 | https://github.com/apidotmy/CVE-2019-16759 |
psychoxploit/vbull | https://github.com/psychoxploit/vbull |
nako48/CVE-2019-16759 | https://github.com/nako48/CVE-2019-16759 |
sunian19/CVE-2019-16759 | https://github.com/sunian19/CVE-2019-16759 |
Name | URL |
---|---|
jas502n/CVE-2019-16759 | github.com |
M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit | github.com |
theLSA/vbulletin5-rce | github.com |
mas1337/CVE-2019-16759 | github.com |
FarjaalAhmad/CVE-2019-16759 | github.com |
r00tpgp/http-vuln-CVE-2019-16759 | github.com |
apidotmy/CVE-2019-16759 | github.com |
psychoxploit/vbull | github.com |
nako48/CVE-2019-16759 | github.com |
sunian19/CVE-2019-16759 | github.com |