VBulletin software is one the most popular and widely used forum software written in PHP, used by a number of organizations.
Now vBulletin has released an important security fix to address one of the critical security vulnerabilities tracked as CVE-2020-12720.
vBulletin powers more than 100,000 websites, considering its popularity, hackers may jump to exploit the vulnerability soon, users are recommended to patch soon.
Last September an anonymous hacker publicly disclosed an unpatched vBulletin forum software pre-auth RCE Zero-day Exploit.
Following that hackers breach many popular forums exploiting the vulnerability(CVE-2019-16759) and accessed sensitive details such as username, name, e-mail address, last IP used to access the forums.
The vulnerability was found by Charles Fol, a security engineer at Ambionics, the full details of the vulnerability were not disclosed. More details of the vulnerability to be published in the SSTIC conference from June 3-5.
CVE-2020-12720 is an access control vulnerability, Fol tweeted the vulnerability as a critical one.
According to the National Vulnerability Database (NVD), the access control vulnerability affects versions prior to 5.5.6pl1, 5.6.0 before 5.6.0pl1, and 5.6.1 before 5.6.1pl1.
To fix the issue vBulletin has released a new security patch
- 5.6.1 Patch Level 1
- 5.6.0 Patch Level 1
- 5.5.6 Patch Level 1
If you are using a version of vBulletin 5 Connect prior to 5.5.6, it is strongly recommended to upgrade with newer versions.
VBulletin also states that “security patch has already been applied to all vBulletin Cloud sites.”
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.