Skip to content
Identify vulnerable (RCE) vBulletin 5.0.0 - 5.5.4 instances using Shodan (CVE-2019-16759)
Python
Branch: master
Clone or download
Latest commit ae60776 Sep 29, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
README.md Update README.md Sep 29, 2019
bench.py Add files via upload Sep 26, 2019
demo.png Add files via upload Sep 26, 2019
exploit.py Add files via upload Sep 25, 2019
requirements.txt Add files via upload Sep 26, 2019
vbullet-443 Add files via upload Sep 25, 2019
vbullet-80 Add files via upload Sep 25, 2019
vbulletin-scan.py Add files via upload Sep 26, 2019
vbulletin.png Add files via upload Sep 25, 2019

README.md

Mass-Pwn-vBulletin

Identify vulnerable (RCE) vBulletin 5.0.0 - 5.5.4 instances using Shodan (CVE-2019-16759)

Bulletin

Demo

Requirements:

  • Python >= 3.5.3
  • asyncio >= 3.4.3
  • aiohttp >= 3.6.1
  • ipaddress
  • termcolor >= 1.1.0
  • tqdm >= 4.36
  • pyfiglet
  • click >= 7.0
  • IPy >= 1.0

Gathering Hosts:

This tool asynchronously iterates over vBulletin hosts on port 443 and 80 and runs a PoC to test if they are vulnerable to CVE-2019-16759. You can use Shodan to gather potential targets:

shodan download vbullet-443 'html:"vbulletin" port:443'
shodan parse vbullet-443.json.gz --fields ip_str > vbullet-443
shodan download vbullet-80 'html:"vbulletin" port:80'
shodan parse vbullet-80.json.gz --fields ip_str > vbullet-80

Special Thanks:

Thanks to the anonymous user who published this 0day over at https://seclists.org/fulldisclosure/2019/Sep/31

Disclaimer:

I am not responsible for what you do with this tool, this is simply for research purposes.

You can’t perform that action at this time.