vBulletin 5.x 远程代码执行漏洞 (CVE-2019-17132)绕过

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

# [Exploiting vBulletin: "A Tale of a Patch Fail"](/2020/exploiting-vbulletin-a-tale-of-patch-fail/) **Posted:** August 9th, 2020 | **Author:** [zenofex](/author/zenofex/ "Posts by zenofex") | **Filed under:** [Uncategorized](/category/uncategorized/) | [No Comments »](/2020/exploiting-vbulletin-a-tale-of-patch-fail/#respond) On September 23, 2019 [an undisclosed researcher released a bug which allowed for PHP remote code execution in vBulletin 5.0 through 5.4](https://seclists.org/fulldisclosure/2019/Sep/31). This bug (CVE-2019-16759) was labeled as a 'bugdoor' because of its simplicity by a [popular vulnerability broker](https://twitter.com/cbekrar/status/1176803541047861249?) and was marked with a [CVSS 3.x score of 9.8](https://nvd.nist.gov/vuln/detail/CVE-2019-16759) giving it a critical rating. Today, we're going to talk about how the patch that was supplied for the vulnerability was inadequate in blocking exploitation, show how to bypass the resulting fix, and releasing a...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息