Main
Vulnerability Database
Exploits
ID:6278 - Exploit for Deserialization of untrusted data in vBulletin - CVE-2017-17672
ID:6278 - Exploit for Deserialization of untrusted data in vBulletin - CVE-2017-17672
Published: June 17, 2021
Vulnerability identifier: #VU9659
Vulnerability risk: High
CVE-ID: CVE-2017-17672
CWE-ID: CWE-502
Exploitation vector: Remote access
Vulnerable software:
vBulletin
vBulletin
Link to public exploit:
Vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to unsafe usage of PHP’s unserialize() on user-supplied input. A remote attacker can trigger a flaw in vB_Library_Template’s cacheTemplates() function, fetch information on a set of given templates from the database in order to store them inside a cache variable, delete arbitrary files and execute arbitrary code on a vBulletin installation.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists due to unsafe usage of PHP’s unserialize() on user-supplied input. A remote attacker can trigger a flaw in vB_Library_Template’s cacheTemplates() function, fetch information on a set of given templates from the database in order to store them inside a cache variable, delete arbitrary files and execute arbitrary code on a vBulletin installation.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.