vBulletin before 5.6.9 PL1 allows an unauthenticated remote attacker to execute arbitrary code via a crafted HTTP request that triggers deserialization. This occurs because verify_serialized checks that a value is serialized by calling unserialize and then checking for errors. The fixed versions are 5.6.7 PL1, 5.6.8 PL1, and 5.6.9 PL1.
References
Link | Resource |
---|---|
https://www.ambionics.io/blog/vbulletin-unserializable-but-unreachable | Exploit Technical Description Third Party Advisory |
https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4473890-vbulletin-5-6-9-security-patch | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2023-02-02 21:15
Updated : 2023-02-13 06:55
NVD link : CVE-2023-25135
Mitre link : CVE-2023-25135
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
vbulletin
- vbulletin