[ authorization ] [ registration ] [ Wiederherstellen ]
Kontaktiere uns
You can contact us by:
0day.today Exploits Market and 0day Exploits Database

vBulletin 5.5.2 PHP Object Injection Exploit

[ 0Day-ID-38084 ]
Gesamte Überschrift
vBulletin 5.5.2 PHP Object Injection Exploit [ Highlight ]
Highlight - is paid service, that can help to get more visitors to your material.

Price:
Datum hinzufügen
Kategorie
Betriebssystem
Überprüft
Preis
Kostenlos
Risiko
[
Security Risk Critical
]
Rel. releases
Beschreibung
vBulletin versions 5.5.2 and below suffers from an issue where user input passed through the "messageids" request parameter to /ajax/api/vb4_private/movepm is not properly sanitized before being used in a call to the unserialize() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope, allowing them to carry out a variety of attacks, such as executing arbitrary PHP code.
Other Information
Abuses
0
Kommentare
0
Gelesen
3 649
We DO NOT use Telegram or any messengers / social networks! We DO NOT use Telegram or any messengers / social networks! Please, beware of scammers!
Kostenlos
Open Exploit
You can open this source code for free
Open Exploit
Open Exploit
You can open this source code for free
Verified by
Verified by
This material is checked by Administration and absolutely workable.
Autor
BL
29
Exploits
129
Leser
2
[ Kommentare: 0 ]
Terms of use of comments:
  • Users are forbidden to exchange personal contact details
  • Haggle on other sites\projects is forbidden
  • Reselling is forbidden
Punishment: permanent block of user account with all Gold.

Logge Dich ein, oder registriere Dich, um Kommentare zu schreiben