First published: Thu Dec 14 2017(Updated: )
In vBulletin through 5.3.x, there is an unauthenticated deserialization vulnerability that leads to arbitrary file deletion and, under certain circumstances, code execution, because of unsafe usage of PHP's unserialize() in vB_Library_Template's cacheTemplates() function, which is a publicly exposed API. This is exploited with the templateidlist parameter to ajax/api/template/cacheTemplates.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
vBulletin vBulletin | >=5.0.1<=5.3.3 | |
vBulletin vBulletin | =5.0.0-beta_11 | |
vBulletin vBulletin | =5.0.0-beta_28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17672 is an unauthenticated deserialization vulnerability in vBulletin 5.0.1 through 5.3.x that can lead to arbitrary file deletion and, in some cases, code execution.
CVE-2017-17672 is considered critical with a severity score of 9.8 out of 10.
vBulletin versions 5.0.1 through 5.3.x are affected by CVE-2017-17672.
CVE-2017-17672 is a deserialization vulnerability.
CVE-2017-17672 can be exploited by exploiting the unsafe usage of PHP's unserialize() in vB_Library_Template's cacheTemplates() function, leading to arbitrary file deletion and potential code execution.