First published: Fri Jan 02 2015(Updated: )
Cross-site request forgery (CSRF) vulnerability in the Moderator Control Panel in vBulletin 4.2.2 allows remote attackers to hijack the authentication of administrators for requests that (1) ban a user via the username parameter in a dobanuser action to modcp/banning.php or (2) unban a user, (3) modify user profiles, edit a (4) post or (5) topic, or approve a (6) post or (7) topic via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
vBulletin | =4.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9438 is classified as a medium-severity vulnerability due to its potential to allow unauthorized access by remote attackers.
To fix CVE-2014-9438, it is recommended to update vBulletin to the latest version that includes security patches addressing this CSRF vulnerability.
The vulnerability in CVE-2014-9438 specifically affects administrators using vBulletin version 4.2.2.
CVE-2014-9438 can enable cross-site request forgery (CSRF) attacks, allowing attackers to perform actions such as banning or unbanning users on behalf of an authenticated administrator.
While CVE-2014-9438 was reported in 2014, it is still a concern for users of vBulletin 4.2.2 who have not applied necessary security updates.