In vBulletin through 5.3.x, there is an unauthenticated deserialization vulnerability that leads to arbitrary file deletion and, under certain circumstances, code execution, because of unsafe usage of PHP's unserialize() in vB_Library_Template's cacheTemplates() function, which is a publicly exposed API. This is exploited with the templateidlist parameter to ajax/api/template/cacheTemplates.
References
Link | Resource |
---|---|
https://blogs.securiteam.com/index.php/archives/3573 | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/43362/ | Exploit Third Party Advisory VDB Entry |
https://blogs.securiteam.com/index.php/archives/3573 | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/43362/ | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://blogs.securiteam.com/index.php/archives/3573 - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/43362/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2017-12-14 00:29
Updated : 2024-11-21 03:18
NVD link : CVE-2017-17672
Mitre link : CVE-2017-17672
CVE.ORG link : CVE-2017-17672
JSON object : View
Products Affected
vbulletin
- vbulletin
CWE
CWE-502
Deserialization of Untrusted Data