First published: Tue Aug 30 2016(Updated: )
SQL injection vulnerability in forumrunner/includes/moderation.php in vBulletin before 4.2.2 Patch Level 5 and 4.2.3 before Patch Level 1 allows remote attackers to execute arbitrary SQL commands via the postids parameter to forumrunner/request.php, as exploited in the wild in July 2016.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
vBulletin | <=4.2.2 | |
vBulletin | =4.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6195 is classified as a critical SQL injection vulnerability that can result in remote code execution.
To fix CVE-2016-6195, update your vBulletin installation to version 4.2.2 Patch Level 5 or 4.2.3 Patch Level 1 or later.
CVE-2016-6195 affects vBulletin versions prior to 4.2.2 Patch Level 5 and version 4.2.3 before Patch Level 1.
Yes, CVE-2016-6195 can allow attackers to execute arbitrary SQL commands, potentially leading to data loss or corruption.
You can check if your system is vulnerable by confirming the vBulletin version and patches implemented against CVE-2016-6195.