vBulletin before 5.6.9 PL1 allows an unauthenticated remote attacker to execute arbitrary code via a crafted HTTP request that triggers deserialization. This occurs because verify_serialized checks that a value is serialized by calling unserialize and then checking for errors. The fixed versions are 5.6.7 PL1, 5.6.8 PL1, and 5.6.9 PL1.
References
Link | Resource |
---|---|
https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4473890-vbulletin-5-6-9-security-patch | Release Notes Vendor Advisory |
https://www.ambionics.io/blog/vbulletin-unserializable-but-unreachable | Exploit Technical Description Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-02-03T00:00:00
Updated: 2023-02-03T00:00:00
Reserved: 2023-02-03T00:00:00
Link: CVE-2023-25135
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-02-03T05:15:10.737
Modified: 2023-02-13T14:55:14.403
Link: CVE-2023-25135
JSON object: View
Redhat Information
No data.
CWE