First published: Fri Oct 30 2020(Updated: )
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759. ALSO NOTE: CVE-2020-7373 is a duplicate of CVE-2020-17496. CVE-2020-17496 is the preferred CVE ID to track this vulnerability.
Credit: cve@rapid7.con
Affected Software | Affected Version | How to fix |
---|---|---|
vBulletin vBulletin | >=5.5.4<=5.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7373 is a vulnerability in vBulletin versions 5.5.4 through 5.6.2 that allows remote command execution.
The severity of CVE-2020-7373 is critical with a CVSS score of 9.8.
CVE-2020-7373 allows an attacker to execute remote commands by manipulating subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request.
Yes, a security patch has been released by vBulletin to address the vulnerability.
You can find more information about CVE-2020-7373 in the references provided: [ref1], [ref2].