First published: Tue Oct 08 2019(Updated: )
vBulletin 5.5.4 allows SQL Injection via the ajax/api/hook/getHookList or ajax/api/widget/getWidgetList where parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
vBulletin vBulletin | <=5.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17271 is a vulnerability in vBulletin 5.5.4 that allows SQL Injection via the ajax/api/hook/getHookList or ajax/api/widget/getWidgetList where parameter.
CVE-2019-17271 has a severity rating of medium with a CVSS score of 4.9.
CVE-2019-17271 affects vBulletin versions up to and including 5.5.4.
To fix CVE-2019-17271, you should update vBulletin to a version that is not affected by the vulnerability.
You can find more information about CVE-2019-17271 on the following websites: [Packet Storm Security](http://packetstormsecurity.com/files/154758/vBulletin-5.5.4-SQL-Injection.html), [vBulletin Forums](https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa).