Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-16759 PoC — vBulletin 输入验证错误漏洞

Source
Associated Vulnerability
Title:vBulletin 输入验证错误漏洞 (CVE-2019-16759)
Description:vBulletin是美国InternetBrands和vBulletinSolutions公司的一款基于PHP和MySQL的开源Web论坛程序。 vBulletin 5.x版本至5.5.4版本中存在安全漏洞。攻击者可借助‘widgetConfig[code]’参数利用该漏洞执行命令。
Description
Identify vulnerable (RCE) vBulletin 5.0.0 - 5.5.4 instances using Shodan (CVE-2019-16759)
Readme
# Mass-Pwn-vBulletin
Identify vulnerable (RCE) vBulletin 5.0.0 - 5.5.4 instances using Shodan (CVE-2019-16759)

![Bulletin](https://raw.githubusercontent.com/Frint0/mass-pwn-vbulletin/master/vbulletin.png)

![Demo](https://raw.githubusercontent.com/Frint0/mass-pwn-vbulletin/master/demo.png)

## Requirements:

* Python >= 3.5.3
* asyncio >= 3.4.3
* aiohttp >= 3.6.1
* ipaddress
* termcolor >= 1.1.0
* tqdm >= 4.36
* pyfiglet
* click >= 7.0
* IPy >= 1.0

## Gathering Hosts:

This tool asynchronously iterates over vBulletin hosts on port 443 and 80 and runs a PoC to test if they are vulnerable to CVE-2019-16759. You can use Shodan to gather potential targets:

```
shodan download vbullet-443 'html:"vbulletin" port:443'
shodan parse vbullet-443.json.gz --fields ip_str > vbullet-443
shodan download vbullet-80 'html:"vbulletin" port:80'
shodan parse vbullet-80.json.gz --fields ip_str > vbullet-80
```

## Special Thanks:

Thanks to the anonymous user who published this 0day over at https://seclists.org/fulldisclosure/2019/Sep/31

## Disclaimer:

I am not responsible for what you do with this tool, this is simply for research purposes.
File Snapshot

[4.0K] /data/pocs/4febb4dc2851179c4141674693ec3f5d00643f8c ├── [2.5K] bench.py ├── [ 93K] demo.png ├── [ 735] exploit.py ├── [1.1K] README.md ├── [ 86] requirements.txt ├── [ 14K] vbullet-443 ├── [ 14K] vbullet-80 ├── [105K] vbulletin.png └── [1.8K] vbulletin-scan.py 0 directories, 9 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.