In vBulletin through 5.3.x, there is an unauthenticated deserialization vulnerability that leads to arbitrary file deletion and, under certain circumstances, code execution, because of unsafe usage of PHP's unserialize() in vB_Library_Template's cacheTemplates() function, which is a publicly exposed API. This is exploited with the templateidlist parameter to ajax/api/template/cacheTemplates.
                
            References
                    | Link | Resource | 
|---|---|
| https://blogs.securiteam.com/index.php/archives/3573 | Exploit Third Party Advisory | 
| https://www.exploit-db.com/exploits/43362/ | Exploit Third Party Advisory VDB Entry | 
| https://blogs.securiteam.com/index.php/archives/3573 | Exploit Third Party Advisory | 
| https://www.exploit-db.com/exploits/43362/ | Exploit Third Party Advisory VDB Entry | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 03:18
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://blogs.securiteam.com/index.php/archives/3573 - Exploit, Third Party Advisory | |
| References | () https://www.exploit-db.com/exploits/43362/ - Exploit, Third Party Advisory, VDB Entry | 
Information
                Published : 2017-12-14 00:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-17672
Mitre link : CVE-2017-17672
CVE.ORG link : CVE-2017-17672
JSON object : View
Products Affected
                vbulletin
- vbulletin
CWE
                
                    
                        
                        CWE-502
                        
            Deserialization of Untrusted Data
