vBulletin 5.5.4 allows Two SQL Injection Vulnerabilities

Overview :
vBulletin 5.5.4 allows SQL Injection via the ajax/api/hook/getHookList or ajax/api/widget/getWidgetList where parameter.
Affected Product(s) :
  • vBulletin 5.5.4
Vulnerability Details :
CVE ID : CVE-2019-17271
1) User input passed through keys of the “where” parameter to
the “ajax/api/hook/getHookList” endpoint is not properly validated
before being used in an SQL query. This can be exploited to e.g.
read sensitive data from the database through in-band SQL injection
attacks. Successful exploitation of this vulnerability requires an
user account with the “canadminproducts” or “canadminstyles” permission.2) User input passed through keys of the “where” parameter to
the “ajax/api/widget/getWidgetList” endpoint is not properly validated
before being used in an SQL query. This can be exploited to e.g.
read sensitive data from the database through time-based SQL injection
attacks. Successful exploitation of this vulnerability requires an
user account with the “canusesitebuilder” permission.

Solution :
Apply the vendor Security Patch Level 2 or upgrade to version 5.5.5 or
later.

Facebook
Twitter
LinkedIn

Recent Blog Posts

Zero Trust Security Providers 2025 – Top 10 Ranked List
Best Intrusion Detection Systems (IDS) to Use in 2025
Top 5 Cybersecurity Risk Management Strategies for 2025
Top 5 Emerging API Security Threats in 2025
8 Best Security Operations Center (SOC) Providers for 2025

WAF Solution