Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-16759 PoC — vBulletin 输入验证错误漏洞

Source
Associated Vulnerability
Title:vBulletin 输入验证错误漏洞 (CVE-2019-16759)
Description:vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request.
Description
This tools will extracts and dumps Email + SMTP from vBulletin database server
Readme
# vBulletin RCE 5.x Get Email + SMTP

# CVE-2019-16759
This tools will extracts and dumps Email + SMTP from database server

## USAGE
```bash
$ git clone https://github.com/mas1337/CVE-2019-16759.git && cd CVE-2019-16759
$ ./vb-email-smtp.sh list.txt
```
## Disclaimer
All code on this repository is for educational purposes only and is not intended for production code. The code is supplied "as is". Use at your own risks.

## Example
![](example.gif)

## Note
Use list with http:// or https://
File Snapshot

[4.0K] /data/pocs/64eb9a036a128a2a3a4031075de859ee83ba9169 ├── [ 17M] example.gif ├── [ 496] README.md └── [7.1K] vb-email-smtp.sh 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →