First published: Sat Oct 25 2014(Updated: )
Cross-site scripting (XSS) vulnerability in admincp/apilog.php in vBulletin 4.2.2 and earlier, and 5.0.x through 5.0.5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted XMLRPC API request, as demonstrated using the client name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
vBulletin | <=4.2.2 | |
vBulletin | =5.0.0 | |
vBulletin | =5.0.1 | |
vBulletin | =5.0.2 | |
vBulletin | =5.0.3 | |
vBulletin | =5.0.4 | |
vBulletin | =5.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2021 is classified as a high-severity cross-site scripting (XSS) vulnerability.
To fix CVE-2014-2021, upgrade to vBulletin version 5.0.6 or later.
CVE-2014-2021 affects vBulletin versions 4.2.2 and earlier and 5.0.x up to 5.0.5.
No, CVE-2014-2021 can only be exploited by remote authenticated users.
CVE-2014-2021 allows for remote authenticated users to inject arbitrary web scripts or HTML, potentially compromising the security of the application.