News

Developers released a patch for the 0-day bug in vBulletin, but it turned out that the vulnerability had been exploited for years.

Yesterday it was reported that a certain anonymous researcher published in the public domain details of the dangerous zero-day vulnerability in the vBulletin forum engine, as well as an exploit for it. Now it turned out that this vulnerability has been exploited for years.

The bug allows an attacker to execute shell commands on a vulnerable server. Moreover, an attacker just needs to use a simple HTTP POST request and does not need to have an account on the targeted forum, that is, the problem belongs to the unpleasant class of pre-authentication vulnerabilities.

“Essentially, any attack exploits a super simple command injection. An attacker sends the payload, vBulletin then runs the command, and it responds back to the attacker with whatever they asked for. If an attacker issues a shell command as part of the injection, vBulletin will run Linux commands on its host with whatever user permissions vBulletins’ system-level user account has access to”, — Ryan Seguin, a research engineer at Tenable, told.

Now on the GitHub arrived a more detailed description of the problem, and a script has also been published on the network to search for vulnerable servers. VBulletin users, in turn, have already begun reporting about attacks on their forums. Some even complain about the complete removal of the database with this bug.

Interestingly, after the publication of vulnerability data, the head of Zerodium, Chauki Bekrar, said on Twitter that his company and customers had been aware of this problem for three years, and exploits for it had long been sold on the black market.

“The recent vBulletin pre-auth RCE 0-day disclosed by a researcher on full-disclosure looks like a bugdoor, a perfect candidate for @PwnieAwards 2020. Easy to spot and exploit. Many researchers were selling this exploit for years. @Zerodium customers were aware of it since 3 years”, — wrote Chaouki Bekrar.

Since the developers of vBulletin were silent, IS expert Nick Cano promptly prepared an unofficial patch for this bug. To use it, just edit includes/vb5/frontend/controller/bbcode.php accordingly.

Finally, on the evening of September 25, vBulletin developers broke silence and announced the release of a patch for vBulletin version 5.5.X. The vulnerability was assigned the identifier CVE-2019-16759.

Polina Lisovskaya

I works as a marketing manager for years now and loves searching for interesting topics for you

Recent Posts

Remove Rengine.click Pop-up Ads

About Rengine.click Rengine.click pop-ups can not expose out of the blue. If you have actually…

2 days ago

Remove Xzcczxxx.xyz Pop-up Ads

About Xzcczxxx.xyz Xzcczxxx.xyz pop-ups can not introduce out of nowhere. If you have clicked on…

2 days ago

Remove Xefkqo.info Pop-up Ads

About Xefkqo.info Xefkqo.info pop-ups can not open out of nowhere. If you have actually clicked…

2 days ago

Remove Rt9.lol Pop-up Ads

About Rt9.lol Rt9.lol pop-ups can not introduce out of the blue. If you have actually…

2 days ago

Remove Sex-hd.xxx Pop-up Ads

About Sex-hd.xxx Sex-hd.xxx pop-ups can not launch out of the blue. If you have actually…

3 days ago

Remove Curestin.co.in Pop-up Ads

About Curestin.co.in Curestin.co.in pop-ups can not introduce out of nowhere. If you have actually clicked…

4 days ago