Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> vBulletin Misc.PHP PHP Script Code Execution Vulnerability


Vulnerability Assessment Details

vBulletin Misc.PHP PHP Script Code Execution Vulnerability

Vulnerability Assessment Summary
Executes phpinfo() on the remote host

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a PHP script that permits execution of
arbitrary PHP code.

Description :

The remote version of vBulletin fails to sanitize input to the
'template' parameter of the 'misc.php' script. Provided the 'Add
Template Name in HTML Comments' setting in vBulletin is enabled, an
unauthenticated attacker may use this flaw to execute arbitrary PHP
commands on the remote host.

See also :

http://archives.neohapsis.com/archives/fulldisclosure/2005-02/0468.html

Solution :

Upgrade to vBulletin 3.0.7 or later.

Network Security Threat Level:

Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)

Networks Security ID: 12622

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors

Dell PowerEdge R300 Dual-Core XEON 3.0GHz 24GB Ram 2 x 300GB SAS 1U Rack Server
$200.0
Dell PowerEdge R300 Dual-Core XEON 3.0GHz 24GB Ram 2 x 300GB SAS 1U Rack Server pictureDell T110 II (4637045) Server
$60.0
Dell T110 II (4637045) Server pictureLenovo ThinkServer TS150 70UB
$846.51
Lenovo ThinkServer TS150 70UB pictureLenovo ThinkSystem ST550 7X10
$2348.03
Lenovo ThinkSystem ST550 7X10 picture


Discussions

No Discussions have been posted on this vulnerability.