An anonymous source has released the details of a zero day vulnerability for popular vBulletin forum platform leaving potentially tens of thousands of sites and millions of users at risk.
The information was published in a post to the Full Disclosure mailing list explaining how users can use a simple HTTP POST request to execute commands remotely on the targeted vBulletin hosts without any authentication. This may allow an attacker to steal or tamper with data or even launch assaults on other systems depending on the level of credentials.
Notable vBulletin customers that could be effected include; Denver Broncos, Pearl Jam, EA, Steam and even NASA. Many dark web forums also often run on vBulletin.
It is not clear if vBulletin were approached with this vulnerability prior to release or the reason for the anonymous researcher releasing the information in this way. Def Con highlighted on Twitter that the Zerodium price chart currently values this exploit anywhere up to $10,000.
Some good news comes in the form of that this zero day will only impact vBulletin version 5 forums. Any forums running earlier versions appear to be safe. Users are being advised to keep a close eye on their servers.
Some more good news is that AppCheck has already released a plug-in for this specific vulnerability. More details below.
Earlier today AppCheck released a new scan plug-in to it’s customers to run quick scans and assess their level of vulnerability in relation this the vBulletin 5.x 0day pre-auth RCE exploit – CVE-2019-16759.
AppCheck’s Head of Development states: “We have confirmed the exploit does work and is an unauthenticated RCE that attackers can exploit. Depending on the user level they access this could range from simply accessing data, editing it or even full system takeover. Earlier today we have included a plug-in for our customers to identify and safely exploit this vulnerability.”
AppCheck regular scans also pick up pre-authentication remote code execution similar to this one.
A researcher has created what appears to be an unofficial patch. Stating ‘I have no clue what functionality this breaks other than the [vuln entrypoint]. Broken is better than insecure […]’ Use at your own risk.
Other fixes include completely taking down the forum until a fix is released.
As always, if you require any more information on this topic or want to see what vulnerabilities AppCheck can pick up in your website and applications then please get in contact with us: info@localhost
No software to download or install.
Contact us or call us 0113 887 8380
AppCheck is a software security vendor based in the UK, offering a leading security scanning platform that automates the discovery of security flaws within organisations websites, applications, network and cloud infrastructure. AppCheck are authorized by te Common Vulnerabilities and Exposures (CVE) Program aas a CVE Numbering Authority (CNA)