First published: Sat Sep 16 2023(Updated: )
A cross-site scripting (XSS) vulnerability in the Admin Control Panel of vBulletin 5.7.5 and 6.0.0 allows attackers to execute arbitrary web scripts or HTML via the /login.php?do=login url parameter.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
vBulletin vBulletin | <=6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39777 is a cross-site scripting (XSS) vulnerability in the Admin Control Panel of vBulletin 5.7.5 and 6.0.0.
CVE-2023-39777 allows attackers to execute arbitrary web scripts or HTML through the /login.php?do=login URL parameter in the Admin Control Panel of vBulletin 5.7.5 and 6.0.0.
CVE-2023-39777 has a severity rating of medium, with a CVSS score of 5.4.
To fix CVE-2023-39777, it is recommended to update vBulletin to version 6.0.1 or later, as this vulnerability is fixed in newer versions.
For more information about CVE-2023-39777, you can refer to the following link: [https://gist.github.com/GiongfNef/8fe658dce4c7fcf3a7b4e6387e50141c](https://gist.github.com/GiongfNef/8fe658dce4c7fcf3a7b4e6387e50141c)