cve/2020/CVE-2020-17496.md

34 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-17496](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17496)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759.
### POC
#### Reference
- https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/
2024-06-09 00:33:16 +00:00
- https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/HimmelAward/Goby_POC
- https://github.com/Live-Hack-CVE/CVE-2020-17496
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Z0fhack/Goby_POC
- https://github.com/ctlyz123/CVE-2020-17496
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/ludy-dev/vBulletin_5.x-tab_panel-RCE
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC