Software developer vBulletin announced on Wednesday that it had released a patch to address a serious SQL injection vulnerability affecting the its forum software.
The existence of the security hole came to light on Tuesday, when Nytro, the administrator of the hacker community forum Romanian Security Team (RST) published a video demonstrating an SQL Injection attack against the latest version of vBulletin (5.1.2). The expert said he didn’t plan on selling the exploit; instead he reported his findings to vBulletin developers.
After analyzing the issue, vBulletin determined that the vulnerability also affects versions 5.0.4, 5.0.5, 5.1.0 and 5.1.1.
“We have released security patches to account for this vulnerability. The issue may allow attackers to perform SQL injection attacks on your database. It is recommended that all users update as soon as possible,” said vBulletin Technical Support Lead Wayne Luke.
Forums hosted on vBulletin Cloud have been patched automatically. The fix will also be included in the next release of vBulletin 5.1.3 Alpha, which is not recommended for production or live servers.
SQL Injection flaws, which enable attackers to gain unauthorized access to a website’s databases and possibly even to the underlying server, are highly common. A study published in April by the Ponemon Institute revealed that 65% of surveyed IT professionals had detected at least one SQL Injection attack that bypassed their defense systems. The study found that, on average, it takes organizations 140 days to discover such attacks.
Nytro says he will make the exploit for this vulnerability public, but only after users get the chance to patch their installations. On the other hand, Sucuri CTO Daniel Cid believes that the flaw might already be exploited in the wild considering that it was discovered by the members of a hacker forum.
vBulletin security holes are often targeted by cybercriminals because the platform is used to power well over 100,000 forums. In October 2013, Imperva reported that over 35,000 websites were compromised by attackers who abused the vBulletin configuration mechanism to create a secondary administrative account that gave them full control over targeted sites. Shortly after, vBulletin reported that its own networks had been breached in a sophisticated attack. At the time, the company refuted a hacker group’s claims about a zero-day exploit.
Nytro’s proof-of-concept video is embedded below.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
- Mozilla Patches High-Severity Vulnerabilities With Release of Firefox 111
- Microsoft: 17 European Nations Targeted by Russia in 2023 as Espionage Ramping Up
Latest News
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Oleria Scores $8M Seed Funding for ID Authentication Technology
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- News Analysis: UK Commits $3 Billion to Support National Quantum Strategy
- Malicious NuGet Packages Used to Target .NET Developers
