CVE-2016-6195

CRITICAL EXPLOITED IN THE WILD NUCLEI

vBulletin <4.2.2 PL5 & <4.2.3 PL1 - SQL Injection

Title source: llm

Description

SQL injection vulnerability in forumrunner/includes/moderation.php in vBulletin before 4.2.2 Patch Level 5 and 4.2.3 before Patch Level 1 allows remote attackers to execute arbitrary SQL commands via the postids parameter to forumrunner/request.php, as exploited in the wild in July 2016.

Exploits (3)

github WORKING POC 1 stars
by vaishakhcv · perlpoc
https://github.com/vaishakhcv/CVE-exploits/tree/master/CVE-2016-6195
github WORKING POC
by winterwolf32 · perlpoc
https://github.com/winterwolf32/CVE_Exploits-/tree/master/CVE-2016-6195
exploitdb WORKING POC VERIFIED
by Manish Tanwar · textwebappsphp
https://www.exploit-db.com/exploits/40751

Nuclei Templates (1)

vBulletin <= 4.2.3 - SQL Injection
CRITICALVERIFIEDby MaStErChO
Shodan: title:"Powered By vBulletin" || http.html:"powered by vbulletin" || http.component:"vbulletin" || http.title:"powered by vbulletin" || cpe:"cpe:2.3:a:vbulletin:vbulletin"
FOFA: body="powered by vbulletin" || title="powered by vbulletin"

Scores

CVSS v3 9.8
EPSS 0.8574
EPSS Percentile 99.4%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2016-08-30
InTheWild.io 2017-08-21

Classification

CWE
CWE-89
Status draft

Affected Products (2)

vbulletin/vbulletin < 4.2.2
vbulletin/vbulletin

Timeline

Published Aug 30, 2016
Tracked Since Feb 18, 2026