SB2020081101 - Remote code execution in vBulletin



SB2020081101 - Remote code execution in vBulletin

Published: August 11, 2020 Updated: August 21, 2020

Security Bulletin ID SB2020081101
Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Code Injection (CVE-ID: CVE-2020-17496)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation when processing untrused input passed via the "subWidgets[0][config][code]" HTTP parameter to "/ajax/render/widget_tabbedcontainer_tab_panel" URL. A remote attacker can send a specially crafted request and execute arbitrary PHP code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Exploitation example:

curl -s http://SITE/ajax/render/widget_tabbedcontainer_tab_panel -d 'subWidgets[0][template]=widget_php&subWidgets[0][config][code]=echo shell_exec("id"); exit;'


Remediation

Install update from vendor's website.