CVE-2023-25135

vBulletin before 5.6.9 PL1 allows an unauthenticated remote attacker to execute arbitrary code via a crafted HTTP request that triggers deserialization. This occurs because verify_serialized checks that a value is serialized by calling unserialize and then checking for errors. The fixed versions are 5.6.7 PL1, 5.6.8 PL1, and 5.6.9 PL1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vbulletin:vbulletin:5.6.7:-:*:*:*:*:*:*
cpe:2.3:a:vbulletin:vbulletin:5.6.8:-:*:*:*:*:*:*
cpe:2.3:a:vbulletin:vbulletin:5.6.9:-:*:*:*:*:*:*

History

21 Nov 2024, 07:49

Type Values Removed Values Added
References () https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4473890-vbulletin-5-6-9-security-patch - Release Notes, Vendor Advisory () https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4473890-vbulletin-5-6-9-security-patch - Release Notes, Vendor Advisory
References () https://www.ambionics.io/blog/vbulletin-unserializable-but-unreachable - Exploit, Technical Description, Third Party Advisory () https://www.ambionics.io/blog/vbulletin-unserializable-but-unreachable - Exploit, Technical Description, Third Party Advisory
Summary
  • (es) vBulletin anterior a 5.6.9 PL1 permite que un atacante remoto no autenticado ejecute código arbitrario a través de una solicitud HTTP manipulada que desencadena la deserialización. Esto ocurre porque verificar_serialized verifica que un valor esté serializado llamando a unserialize y luego verificando si hay errores. Las versiones fijas son 5.6.7 PL1, 5.6.8 PL1 y 5.6.9 PL1.

Information

Published : 2023-02-03 05:15

Updated : 2024-11-21 07:49


NVD link : CVE-2023-25135

Mitre link : CVE-2023-25135

CVE.ORG link : CVE-2023-25135


JSON object : View

Products Affected

vbulletin

  • vbulletin
CWE
CWE-502

Deserialization of Untrusted Data