Vulnerability Details : CVE-2005-0511
Public exploit exists!
misc.php for vBulletin 3.0.6 and earlier, when "Add Template Name in HTML Comments" is enabled, allows remote attackers to execute arbitrary PHP code via nested variables in the template parameter.
Exploit prediction scoring system (EPSS) score for CVE-2005-0511
88.61%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2005-0511
-
vBulletin misc.php Template Name Arbitrary Code Execution
Disclosure Date: 2005-02-25First seen: 2020-04-26exploit/unix/webapp/php_vbulletin_templateThis module exploits an arbitrary PHP code execution flaw in the vBulletin web forum software. This vulnerability is only present when the "Add Template Name in HTML Comments" option is enabled. All versions of vBulletin prior to 3.0.7 are affected.
CVSS scores for CVE-2005-0511
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2005-0511
-
http://marc.info/?l=bugtraq&m=110910899415763&w=2
-
http://www.securityfocus.com/bid/12622
VBulletin Misc.PHP Arbitrary PHP Script Code Execution Vulnerability
-
http://www.vbulletin.com/forum/showthread.php?postid=819562
Products affected by CVE-2005-0511
- cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.9_can:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.0_beta_2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.0_can4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.0_rc4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.0_beta_2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.0_beta_3:*:*:*:*:*:*:*