# N/A
## 漏洞概述
vBulletin 版本 5.0.0 至 5.7.5 和 6.0.0 至 6.0.3 中存在漏洞,允许未认证用户调用受保护的 API 控制器的方法,该漏洞在使用 PHP 8.1 或更高版本时可被触发。
## 影响版本
- vBulletin 5.0.0 至 5.7.5
- vBulletin 6.0.0 至 6.0.3
## 漏洞细节
该漏洞是由于未认证用户可以通过特定的请求模式调用受保护的 API 控制器的方法。例如,利用 URL 路径 `/api.php?method=protectedMethod` 可以调用受保护的方法。
## 影响
该漏洞可能导致未经授权的访问,攻击者可能利用此漏洞执行任意受保护的操作,从而对系统造成潜在的安全威胁。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 contain an authentication bypass caused by unauthenticated access to protected API controllers on PHP 8.1 or later, letting unauthenticated attackers invoke protected methods remotely.Starting from PHP 8.1, due to an internal adjustment to handling of ReflectionMethod::invoke() and similar methods, it now allows — by default — invocation of protected / private methods when using PHP's Reflection API. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-48827.yaml | POC详情 |
2 | Critical Unauthenticated API Access in vBulletin | https://github.com/0xgh057r3c0n/CVE-2025-48827 | POC详情 |
3 | Vbullettin RCE - CVE-2025-48827 | https://github.com/wiseep/CVE-2025-48827 | POC详情 |
4 | This repository contains a proof-of-concept exploit for CVE-2025-48827, a critical authentication bypass vulnerability affecting vBulletin 5.0.0–5.7.5 and 6.0.0–6.0.3 when running on PHP 8.1 or later. The vulnerability allows unauthenticated attackers to invoke protected API methods remotely. | https://github.com/SystemVll/CVE-2025-48827 | POC详情 |
标题: Don't Call That "Protected" Method: Dissecting an N-Day vBulletin RCE | Karma(In)Security -- 🔗来源链接
标签:
神龙速读暂无评论