CISA Known Exploited Vulnerability
This vulnerability is actively exploited in the wild and listed in the CISA Known Exploited Vulnerabilities catalog.
Remediation Deadline: May 3, 2022
Description
The PHP module within vBulletin contains an unspecified vulnerability that allows for remote code execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request.
CVSS Score
9.8/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HEPSS — Exploit Probability
94.4%
Higher than 100.0% of all CVEs
Weakness Classification (CWE)
Known Exploits
POChttp://packetstormsecurity.com/files/154623/vBulletin-5.x-0-Day-Pre-Auth-Remote-Command-Execution.htmlExploithttp://packetstormsecurity.com/files/154648/vBulletin-5.x-Pre-Auth-Remote-Code-Execution.htmlExploithttp://packetstormsecurity.com/files/155633/vBulletin-5.5.4-Remote-Command-Execution.htmlExploithttp://packetstormsecurity.com/files/158829/vBulletin-5.x-Remote-Code-Execution.htmlExploithttp://packetstormsecurity.com/files/158830/vBulletin-5.x-Remote-Code-Execution.htmlExploithttp://packetstormsecurity.com/files/158866/vBulletin-5.x-Remote-Code-Execution.htmlExploithttp://seclists.org/fulldisclosure/2020/Aug/5Exploithttps://arstechnica.com/information-technology/2019/09/public-exploit-code-spawns-mass-attacks-against-high-severity-vbulletin-bug/Exploithttps://seclists.org/fulldisclosure/2019/Sep/31Exploithttp://packetstormsecurity.com/files/154623/vBulletin-5.x-0-Day-Pre-Auth-Remote-Command-Execution.htmlExploithttp://packetstormsecurity.com/files/154648/vBulletin-5.x-Pre-Auth-Remote-Code-Execution.htmlExploithttp://packetstormsecurity.com/files/155633/vBulletin-5.5.4-Remote-Command-Execution.htmlExploithttp://packetstormsecurity.com/files/158829/vBulletin-5.x-Remote-Code-Execution.htmlExploithttp://packetstormsecurity.com/files/158830/vBulletin-5.x-Remote-Code-Execution.htmlExploithttp://packetstormsecurity.com/files/158866/vBulletin-5.x-Remote-Code-Execution.htmlExploithttp://seclists.org/fulldisclosure/2020/Aug/5Exploithttps://arstechnica.com/information-technology/2019/09/public-exploit-code-spawns-mass-attacks-against-high-severity-vbulletin-bug/Exploithttps://seclists.org/fulldisclosure/2019/Sep/31Exploit
Required Action
https://nvd.nist.gov/vuln/detail/CVE-2019-16759
Risk Assessment
CRITICALIn CISA KEV
Known exploit
Critical CVSS
High EPSS
Details
- Severity
- High
- CVSS
- 9.8
- EPSS
- 94.4%
- CWE
- CWE-94
- Exploit
- POC
- CISA KEV
- Yes
- Ransomware
- Unknown
- Articles
- 0
Timeline
Published
Nov 3, 2021
Added to KEV
Nov 3, 2021
Remediation Due
May 3, 2022