ID CVE-2005-3024
Summary Multiple SQL injection vulnerabilities in vBulletin 3.0.7 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) announcement parameter to announcement.php, the (2) thread[forumid] or (3) criteria parameters to thread.php, (4) userid parameter to user.php, the (5) calendarcustomfieldid, (6) calendarid, (7) moderatorid, (8) holidayid, (9) calendarmoderatorid, or (10) calendar[0] parameters to admincalendar.php, (11) the cronid parameter to cronlog.php, (12) user[usergroupid][0] parameter to email.php, (13) help[0] parameter to help.php, the (14) limitnumber or (15) limitstart parameter to user.php, the (16) usertitleid or (17) ids parameters to usertitle.php, (18) rvt[0] parameter to language.php, (19) keep[0] parameter to phrase.php, (20) dostyleid parameter to template.php, (21) thread[forumid] parameter to thread.php, or (22) usertools.php.
References
Vulnerable Configurations
  • cpe:2.3:a:jelsoft:vbulletin:1.0.1:*:lite:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:1.0.1:*:lite:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.0_rc2:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.0_rc2:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.0_rc3:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.0_rc3:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:3.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:3.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:3.0_beta_3:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:3.0_beta_3:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:3.0_beta_4:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:3.0_beta_4:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:3.0_beta_5:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:3.0_beta_5:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:3.0_beta_6:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:3.0_beta_6:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:3.0_beta_7:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:3.0_beta_7:*:*:*:*:*:*:*
  • cpe:2.3:a:jelsoft:vbulletin:3.0_gamma:*:*:*:*:*:*:*
    cpe:2.3:a:jelsoft:vbulletin:3.0_gamma:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 18-10-2016 - 03:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bugtraq 20050920 [BuHa-Security] Multiple vulnerabilities in (admincp/modcp of)
misc http://morph3us.org/advisories/20050917-vbulletin-3.0.7.txt
Last major update 18-10-2016 - 03:32
Published 21-09-2005 - 22:03
Last modified 18-10-2016 - 03:32
Back to Top