First published: Sat Oct 19 2013(Updated: )
The install/upgrade.php scripts in vBulletin 4.1 and 5 allow remote attackers to create administrative accounts via the customerid, htmldata[password], htmldata[confirmpassword], and htmldata[email] parameters, as exploited in the wild in October 2013.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
vBulletin | =4.1 | |
vBulletin | =5.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6129 has a critical severity rating allowing attackers to create administrative accounts.
To fix CVE-2013-6129, update your vBulletin to the latest available version that addresses this vulnerability.
CVE-2013-6129 affects vBulletin versions 4.1 and 5.0.0.
Yes, CVE-2013-6129 can be exploited remotely by attackers to gain unauthorized access.
The parameters involved in the exploitation of CVE-2013-6129 include customerid, htmldata[password], htmldata[confirmpassword], and htmldata[email].