CVE-2020-7373

9.8 CRITICAL

📋 TL;DR

CVE-2020-7373 is a remote command execution vulnerability in vBulletin forums that allows attackers to execute arbitrary code on affected servers. This affects vBulletin versions 5.5.4 through 5.6.2. The vulnerability exists due to incomplete patching of CVE-2019-16759.

💻 Affected Systems

Products:
  • vBulletin
Versions: 5.5.4 through 5.6.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: This vulnerability affects the default installation of vBulletin. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise allowing attackers to execute arbitrary commands, steal data, install malware, or pivot to other systems.

🟠

Likely Case

Remote code execution leading to website defacement, data theft, or installation of backdoors.

🟢

If Mitigated

Attackers can still attempt exploitation but will be blocked by proper input validation and security controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Metasploit module available. Exploitation requires sending crafted subWidgets data to ajax/render/widget_tabbedcontainer_tab_panel endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vBulletin 5.6.3 and later

Vendor Advisory: https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4445227-vbulletin-5-6-0-5-6-1-5-6-2-security-patch

Restart Required: No

Instructions:

1. Download vBulletin 5.6.3 or later from official vendor. 2. Backup current installation. 3. Upload new files overwriting existing installation. 4. Run upgrade script if required.

🔧 Temporary Workarounds

Block vulnerable endpoint

all

Temporarily block access to the vulnerable ajax/render/widget_tabbedcontainer_tab_panel endpoint

# For Apache: add to .htaccess
RewriteEngine On
RewriteRule ^ajax/render/widget_tabbedcontainer_tab_panel - [F,L]
# For Nginx: add to server block
location ~ ^/ajax/render/widget_tabbedcontainer_tab_panel {
    deny all;
}

🧯 If You Can't Patch

  • Implement WAF rules to block malicious requests to ajax/render/widget_tabbedcontainer_tab_panel endpoint
  • Restrict network access to vBulletin installation to trusted IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check vBulletin version in admin panel or via version.txt file in installation directory

Check Version:

cat /path/to/vbulletin/version.txt

Verify Fix Applied:

Verify version is 5.6.3 or later and test that ajax/render/widget_tabbedcontainer_tab_panel endpoint properly validates input

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to ajax/render/widget_tabbedcontainer_tab_panel
  • PHP code execution attempts in web logs
  • Suspicious subWidgets parameter values

Network Indicators:

  • POST requests to /ajax/render/widget_tabbedcontainer_tab_panel with encoded payloads
  • Outbound connections from web server to suspicious IPs

SIEM Query:

source="web_logs" AND uri="/ajax/render/widget_tabbedcontainer_tab_panel" AND (subWidgets="*" OR method="POST")

🔗 References

📤 Share & Export