First published: Fri Sep 02 2016(Updated: )
The media-file upload feature in vBulletin before 3.8.7 Patch Level 6, 3.8.8 before Patch Level 2, 3.8.9 before Patch Level 1, 4.x before 4.2.2 Patch Level 6, 4.2.3 before Patch Level 2, 5.x before 5.2.0 Patch Level 3, 5.2.1 before Patch Level 1, and 5.2.2 before Patch Level 1 allows remote attackers to conduct SSRF attacks via a crafted URL that results in a Redirection HTTP status code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
vBulletin | =3.8.7 | |
vBulletin | =3.8.8 | |
vBulletin | =3.8.9 | |
vBulletin | =4.2.2 | |
vBulletin | =4.2.3 | |
vBulletin | =5.2.0 | |
vBulletin | =5.2.1 | |
vBulletin | =5.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6483 has a Medium severity rating due to its potential for remote code execution.
To fix CVE-2016-6483, upgrade your vBulletin installation to the latest patched version.
vBulletin versions prior to 3.8.7 Patch Level 6, 3.8.8 Patch Level 2, 3.8.9 Patch Level 1, 4.x before 4.2.2 Patch Level 6, 4.2.3 Patch Level 2, 5.x before 5.2.0 Patch Level 3, 5.2.1 Patch Level 1, and 5.2.2 Patch Level 1 are affected.
Yes, CVE-2016-6483 allows remote attackers to exploit the vulnerability.
The impact of CVE-2016-6483 can lead to unintended access to internal services or data due to the SSRF vulnerability.