CVE-2014-5102

SQL injection vulnerability in vBulletin 5.0.4 through 5.1.3 Alpha 5 allows remote attackers to execute arbitrary SQL commands via the criteria[startswith] parameter to ajax/render/memberlist_items.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vbulletin:vbulletin:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vbulletin:vbulletin:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vbulletin:vbulletin:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:vbulletin:vbulletin:5.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:vbulletin:vbulletin:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:vbulletin:vbulletin:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:vbulletin:vbulletin:5.1.2:beta1:*:*:*:*:*:*
cpe:2.3:a:vbulletin:vbulletin:5.1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:vbulletin:vbulletin:5.1.2:rc2:*:*:*:*:*:*
cpe:2.3:a:vbulletin:vbulletin:5.1.3:alpha5:*:*:*:*:*:*

History

21 Nov 2024, 02:11

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/127537/vBulletin-5.1.2-SQL-Injection.html - Exploit () http://packetstormsecurity.com/files/127537/vBulletin-5.1.2-SQL-Injection.html - Exploit
References () http://www.pcworld.com/article/2455500/emergency-vbulletin-patch-fixes-dangerous-sql-injection-vulnerability.html - () http://www.pcworld.com/article/2455500/emergency-vbulletin-patch-fixes-dangerous-sql-injection-vulnerability.html -
References () http://www.securityfocus.com/bid/68709 - () http://www.securityfocus.com/bid/68709 -
References () http://www.vbulletin.com/forum/forum/vbulletin-announcements/vbulletin-announcements_aa/4097503-security-patch-release-for-vbulletin-5-0-4-5-0-5-5-1-0-5-1-1-and-5-1-2 - Vendor Advisory () http://www.vbulletin.com/forum/forum/vbulletin-announcements/vbulletin-announcements_aa/4097503-security-patch-release-for-vbulletin-5-0-4-5-0-5-5-1-0-5-1-1-and-5-1-2 - Vendor Advisory

Information

Published : 2014-07-25 19:55

Updated : 2024-11-21 02:11


NVD link : CVE-2014-5102

Mitre link : CVE-2014-5102

CVE.ORG link : CVE-2014-5102


JSON object : View

Products Affected

vbulletin

  • vbulletin
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')