CVE-2019-16759

Description from NVD

vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request.

Information Acquisition Date:2021-04-27T10:50Z
CVSS 2.0: 7.5 HIGH CVSS 3.x: 9.8 CRITICAL

▼ CVSS3 Vec CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

▼ CVSS2 Vec AV:N/AC:L/Au:N/C:P/I:P/A:P

NVD References

 https://seclists.org/fulldisclosure/2019/Sep/31
     source:MISC
     tags:Exploit    Mailing List    Third Party Advisory    
 https://www.theregister.co.uk/2019/09/24/vbulletin_vbug_zeroday/
     source:MISC
     tags:Press/Media Coverage    Third Party Advisory    
 https://arstechnica.com/information-technology/2019/09/public-exploit-code-spawns-mass-attacks-against-high-severity-vbulletin-bug/
     source:MISC
     tags:Exploit    Press/Media Coverage    Third Party Advisory    
 http://packetstormsecurity.com/files/154623/vBulletin-5.x-0-Day-Pre-Auth-Remote-Command-Execution.html
     source:MISC
     tags:Exploit    Third Party Advisory    VDB Entry    
 http://packetstormsecurity.com/files/154648/vBulletin-5.x-Pre-Auth-Remote-Code-Execution.html
     source:MISC
     tags:Exploit    Third Party Advisory    VDB Entry    
 http://packetstormsecurity.com/files/155633/vBulletin-5.5.4-Remote-Command-Execution.html
     source:MISC
     tags:Exploit    Third Party Advisory    VDB Entry    
 http://packetstormsecurity.com/files/158829/vBulletin-5.x-Remote-Code-Execution.html
     source:MISC
     tags:Exploit    Third Party Advisory    VDB Entry    
 http://packetstormsecurity.com/files/158830/vBulletin-5.x-Remote-Code-Execution.html
     source:MISC
     tags:Exploit    Third Party Advisory    VDB Entry    
 20200811 Remote Code Execution 0day in vBulletin 5.x
     source:FULLDISC
     tags:Exploit    Mailing List    Third Party Advisory    
 http://packetstormsecurity.com/files/158866/vBulletin-5.x-Remote-Code-Execution.html
     source:MISC
     tags:Exploit    Third Party Advisory    VDB Entry    

This vulnerability may involve a PoC.

Description from Forti

vBulletin Routestring widgetConfig Remote Code Execution

This indicates an attack attempt to exploit a Remote Command Execution Vulnerability in vBulletin.The vulnerability is due to an input validation error while parsing a HTTP request in the vulnerable module. A remote attacker could exploit this to execute arbitrary code execution within the context of the application, via a crafted HTTP request.

Information Acquisition Date:2020/09/01

Affected Products

vBulletin Version 5

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Currently, we are not aware of any vendor supplied patch for this issue.

References

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag:



List of frequently cited URLs

URLNum of Times Referred to
https://alerts.vulmon.com/?utm_source=twitter&utm_medium=so...251
https://www.ipa.go.jp/security/ciadr/vul/alert20190927.html6
https://twitter.com/thedarktangent/status/12928139583325962244
https://scan.netsecurity.ne.jp/article/2020/08/13/44433.html4
https://www.helpnetsecurity.com/2020/08/11/fix-cve-2019-16759/4
https://github.com/1N3/Sn1per3
https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-...3
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-...3

Information from Twitter

User URL Info Source Date
tehtris https://tehtris.com/fr/blog/notre-selection-des-alertes-de-... Source tehtris          1630171061323984896 2023/02/27
tehtris https://twitter.com/tehtris/status/1630171061323984896/photo/1 Source tehtris          1630171061323984896 2023/02/27
tehtris https://tehtris.com/en/blog/our-selection-of-alerts-on-hone... Source tehtris          1630172871992524800 2023/02/27
tehtris https://twitter.com/tehtris/status/1630172871992524800/photo/1 Source tehtris          1630172871992524800 2023/02/27
tehtris https://tehtris.com/en/blog/our-selection-of-alerts-on-hone... Source tehtris          1630189582431014912 2023/02/27
tehtris https://twitter.com/tehtris/status/1630189582431014912/photo/1 Source tehtris          1630189582431014912 2023/02/27
tehtris https://tehtris.com/fr/blog/notre-selection-des-alertes-de-... Source tehtris          1630190122992820224 2023/02/27
tehtris https://twitter.com/tehtris/status/1630190122992820224/photo/1 Source tehtris          1630190122992820224 2023/02/27

List of frequently cited URLs

URLNum of Times Referred to
alerts.vulmon.com251
www.ipa.go.jp6
twitter.com4
scan.netsecurity.ne.jp4
www.helpnetsecurity.com4
github.com3
blog.exploitee.rs3
www.trustwave.com3

Information from Twitter

User URL Info Source
tehtris tehtris.com Show Tweet
tehtris twitter.com Show Tweet
tehtris tehtris.com Show Tweet
tehtris twitter.com Show Tweet
tehtris tehtris.com Show Tweet
tehtris twitter.com Show Tweet
tehtris tehtris.com Show Tweet
tehtris twitter.com Show Tweet

GitHub Search Results: Up to 10
NameURL
jas502n/CVE-2019-16759 https://github.com/jas502n/CVE-2019-16759
M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit https://github.com/M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit
theLSA/vbulletin5-rce https://github.com/theLSA/vbulletin5-rce
mas1337/CVE-2019-16759 https://github.com/mas1337/CVE-2019-16759
FarjaalAhmad/CVE-2019-16759 https://github.com/FarjaalAhmad/CVE-2019-16759
r00tpgp/http-vuln-CVE-2019-16759 https://github.com/r00tpgp/http-vuln-CVE-2019-16759
apidotmy/CVE-2019-16759 https://github.com/apidotmy/CVE-2019-16759
psychoxploit/vbull https://github.com/psychoxploit/vbull
nako48/CVE-2019-16759 https://github.com/nako48/CVE-2019-16759
sunian19/CVE-2019-16759 https://github.com/sunian19/CVE-2019-16759

GitHub Search Results: Up to 10
NameURL
jas502n/CVE-2019-16759 github.com
M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit github.com
theLSA/vbulletin5-rce github.com
mas1337/CVE-2019-16759 github.com
FarjaalAhmad/CVE-2019-16759 github.com
r00tpgp/http-vuln-CVE-2019-16759 github.com
apidotmy/CVE-2019-16759 github.com
psychoxploit/vbull github.com
nako48/CVE-2019-16759 github.com
sunian19/CVE-2019-16759 github.com

2023/02/27 Score : 0
Added Har-sia Database : 2020/04/11
Last Modified : 2023/02/27
Highest Scored Date : 2020/08/11
Highest Score : 38