vBulletin 5.x through 5.1.6 allows remote authenticated users to bypass authorization checks and inject private messages into conversations via vectors related to an input validation failure.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2015/04/24/4 | Mailing List Third Party Advisory |
http://www.vbulletin.com/forum/forum/vbulletin-announcements/vbulletin-announcements_aa/4319488-security-patch-released-for-vbulletin-5-1-4-5-1-6-and-vbulletin-cloud | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2015/04/24/4 | Mailing List Third Party Advisory |
http://www.vbulletin.com/forum/forum/vbulletin-announcements/vbulletin-announcements_aa/4319488-security-patch-released-for-vbulletin-5-1-4-5-1-6-and-vbulletin-cloud | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2015/04/24/4 - Mailing List, Third Party Advisory | |
References | () http://www.vbulletin.com/forum/forum/vbulletin-announcements/vbulletin-announcements_aa/4319488-security-patch-released-for-vbulletin-5-1-4-5-1-6-and-vbulletin-cloud - Vendor Advisory |
Information
Published : 2017-09-19 15:29
Updated : 2024-11-21 02:29
NVD link : CVE-2015-3419
Mitre link : CVE-2015-3419
CVE.ORG link : CVE-2015-3419
JSON object : View
Products Affected
vbulletin
- vbulletin
CWE
CWE-20
Improper Input Validation