Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2016-6195 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SQL Injection in vBulletin's `forumrunner` module. πŸ“‰ **Consequences**: Attackers can execute arbitrary SQL commands, leading to potential data theft or system compromise.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Improper input validation in `forumrunner/includes/moderation.php`. πŸ’₯ **Flaw**: The `postids` parameter in `forumrunner/request.php` is not sanitized, allowing SQL injection.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: vBulletin versions **< 4.2.2 Patch Level 5** AND **< 4.2.3 Patch Level 1**. πŸ“¦ **Component**: Specifically the `forumrunner` addon/core.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Capabilities**: Execute arbitrary SQL queries. πŸ”“ **Impact**: Access sensitive database information, potentially compromising user data or site integrity.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **LOW**. 🌐 **Auth**: Remote exploitation possible. βš™οΈ **Config**: No authentication required to send the malicious `postids` parameter.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Exploit**: **YES**. πŸ“‚ **PoC**: Available via Nuclei templates (ProjectDiscovery) and tools like `vbully`. 🌍 **Wild Exploitation**: Publicly documented.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for vBulletin versions < 4.2.3 PL1. πŸ“‘ **Feature**: Look for the `forumrunner/request.php` endpoint accepting `postids`. πŸ› οΈ **Tool**: Use Nuclei templates for automated detection.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: **YES**. 🩹 **Patch**: Update to vBulletin **4.2.2 PL5** or **4.2.3 PL1** or later. πŸ“… **Date**: Patched around Aug 2016.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching is impossible, **disable the `forumrunner` addon** immediately. 🚫 **Block**: Restrict access to `forumrunner/request.php` via WAF rules if possible.

Q10Is it urgent? (Priority Suggestion)

⚠️ **Priority**: **HIGH**. 🚨 **Urgency**: Critical SQLi with remote exploit code available. πŸƒ **Action**: Patch immediately or disable the vulnerable module to prevent data breaches.