Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> vBulletin Init.PHP unspecified vulnerability


Vulnerability Assessment Details

vBulletin Init.PHP unspecified vulnerability

Vulnerability Assessment Summary
Checks the version of vBulletin

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a PHP script that is affected by an
unspecified vulnerability.

Description :

According to its banner, the remote version of vBulletin is vulnerable
to an unspecified issue. It is reported that versions 3.0.0 through
to 3.0.4 are prone to a security flaw in 'includes/init.php'.
Successful exploitation requires that PHP's 'register_globals' setting
be enabled.

See also :

http://www.vbulletin.com/forum/showthread.php?t=125480

Solution :

Upgrade to vBulletin 3.0.5 or later.

Network Security Threat Level:

High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)

Networks Security ID: 12299

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 David Maciejak

Cables, Connectors

Samsung Galaxy Tab 4 SM-T330NU 16GB, 8in - White - BROKEN
$20.0
Samsung Galaxy Tab 4 SM-T330NU 16GB, 8in - White - BROKEN pictureBelkin Slim Style Cover for Samsung Galaxy Tab 4 8.0 Purple
$6.99
Belkin Slim Style Cover for Samsung Galaxy Tab 4 8.0 Purple   pictureDell 7K2G8 Laptop SSD 2.5 128GB 7mm SATA Tested Warranty Ships Today
$60.21
Dell 7K2G8 Laptop SSD 2.5 128GB 7mm SATA Tested Warranty Ships Today pictureSamsung Galaxy TabPro S SM-W700 Wi-Fi, 12in - Black as is
$99.0
Samsung Galaxy TabPro S SM-W700 Wi-Fi, 12in - Black as is picture


Discussions

No Discussions have been posted on this vulnerability.