7.5
CVSSv2

CVE-2013-6129

Published: 19/10/2013 Updated: 21/11/2013
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The install/upgrade.php scripts in vBulletin 4.1 and 5 allow remote malicious users to create administrative accounts via the customerid, htmldata[password], htmldata[confirmpassword], and htmldata[email] parameters, as exploited in the wild in October 2013.

Vulnerable Product Search on Vulmon Subscribe to Product

vbulletin vbulletin 4.1

vbulletin vbulletin 5.0.0

Exploits

source: wwwsecurityfocuscom/bid/62909/info vBulletin is prone to a security-bypass vulnerability Successful exploits can allow attackers to bypass certain security restrictions and perform unauthorized actions #!/usr/bin/perl # # Title: vBulletin remote admin injection exploit # Author: Simo Ben youssef # Contact: Simo_at_Morxploit_c ...

Github Repositories

Lorem ipsum dolor sit amet

Idea to find the vendor and application from CVEs REQUIREMENTS: pip install xmltodict Example: $ python refpy | tail -10 CVE-2013-6129 [[u'vbulletin', u'vbulletin', u'41'], [u'vbulletin', u'vbulletin', u'50']] CVE-2013-6170 [[u'juni