SQL injection vulnerability in forumrunner/includes/moderation.php in vBulletin before 4.2.2 Patch Level 5 and 4.2.3 before Patch Level 1 allows remote attackers to execute arbitrary SQL commands via the postids parameter to forumrunner/request.php, as exploited in the wild in July 2016.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/92687 | |
http://www.vbulletin.org/forum/showthread.php?t=322848 | Vendor Advisory |
https://enumerated.wordpress.com/2016/07/11/1/ | Technical Description Third Party Advisory |
https://github.com/drewlong/vbully | |
http://www.securityfocus.com/bid/92687 | |
http://www.vbulletin.org/forum/showthread.php?t=322848 | Vendor Advisory |
https://enumerated.wordpress.com/2016/07/11/1/ | Technical Description Third Party Advisory |
https://github.com/drewlong/vbully |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/92687 - | |
References | () http://www.vbulletin.org/forum/showthread.php?t=322848 - Vendor Advisory | |
References | () https://enumerated.wordpress.com/2016/07/11/1/ - Technical Description, Third Party Advisory | |
References | () https://github.com/drewlong/vbully - |
Information
Published : 2016-08-30 19:59
Updated : 2024-11-21 02:55
NVD link : CVE-2016-6195
Mitre link : CVE-2016-6195
CVE.ORG link : CVE-2016-6195
JSON object : View
Products Affected
vbulletin
- vbulletin
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')