vBulletin 5.x through 5.1.6 allows remote authenticated users to bypass authorization checks and inject private messages into conversations via vectors related to an input validation failure.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.openwall.com/lists/oss-security/2015/04/24/4 | Mailing List Third Party Advisory | 
| http://www.vbulletin.com/forum/forum/vbulletin-announcements/vbulletin-announcements_aa/4319488-security-patch-released-for-vbulletin-5-1-4-5-1-6-and-vbulletin-cloud | Vendor Advisory | 
| http://www.openwall.com/lists/oss-security/2015/04/24/4 | Mailing List Third Party Advisory | 
| http://www.vbulletin.com/forum/forum/vbulletin-announcements/vbulletin-announcements_aa/4319488-security-patch-released-for-vbulletin-5-1-4-5-1-6-and-vbulletin-cloud | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 02:29
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2015/04/24/4 - Mailing List, Third Party Advisory | |
| References | () http://www.vbulletin.com/forum/forum/vbulletin-announcements/vbulletin-announcements_aa/4319488-security-patch-released-for-vbulletin-5-1-4-5-1-6-and-vbulletin-cloud - Vendor Advisory | 
Information
                Published : 2017-09-19 15:29
Updated : 2025-04-20 01:37
NVD link : CVE-2015-3419
Mitre link : CVE-2015-3419
CVE.ORG link : CVE-2015-3419
JSON object : View
Products Affected
                vbulletin
- vbulletin
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
