Identify vulnerable (RCE) vBulletin 5.0.0 - 5.5.4 instances using Shodan (CVE-2019-16759)# Mass-Pwn-vBulletin
Identify vulnerable (RCE) vBulletin 5.0.0 - 5.5.4 instances using Shodan (CVE-2019-16759)


## Requirements:
* Python >= 3.5.3
* asyncio >= 3.4.3
* aiohttp >= 3.6.1
* ipaddress
* termcolor >= 1.1.0
* tqdm >= 4.36
* pyfiglet
* click >= 7.0
* IPy >= 1.0
## Gathering Hosts:
This tool asynchronously iterates over vBulletin hosts on port 443 and 80 and runs a PoC to test if they are vulnerable to CVE-2019-16759. You can use Shodan to gather potential targets:
```
shodan download vbullet-443 'html:"vbulletin" port:443'
shodan parse vbullet-443.json.gz --fields ip_str > vbullet-443
shodan download vbullet-80 'html:"vbulletin" port:80'
shodan parse vbullet-80.json.gz --fields ip_str > vbullet-80
```
## Special Thanks:
Thanks to the anonymous user who published this 0day over at https://seclists.org/fulldisclosure/2019/Sep/31
## Disclaimer:
I am not responsible for what you do with this tool, this is simply for research purposes.
[4.0K] /data/pocs/4febb4dc2851179c4141674693ec3f5d00643f8c
├── [2.5K] bench.py
├── [ 93K] demo.png
├── [ 735] exploit.py
├── [1.1K] README.md
├── [ 86] requirements.txt
├── [ 14K] vbullet-443
├── [ 14K] vbullet-80
├── [105K] vbulletin.png
└── [1.8K] vbulletin-scan.py
0 directories, 9 files