PT-2013-15: XML External Entities Injection in vBulletin 5 Connect Vulnerable softwarevBulletin Version: 5 Beta 27 and earlierLink: http://vbulletin.com/Severity levelSeverity level: Medium Impact: Internal Network Resources and File System Access, Denial of Service Access Vector: Remote CVSS v2: Base Score: 6.4 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:P)CVE: not assignedSoftware descriptionvBulletin 5 Connect provides unparalleled capabilities for building community websites. The software facilitates increased content creation, more engaging content discovery and simplified site management. Vulnerability descriptionThe specialists of the Positive Research center have detected an XML External Entities Injection vulnerability in vBulletin 5 Connect.The vulnerability was detected in "appender_socket_server.php" of the Apache log4php library used by vBulletin. PHP's built-in SoapClient class allows the use of external entities while parsing SOAP wsdl files which enables an attacker to read arbitrary files. The vulnerable script starts a local proxy on port 4242 and unserializes incoming data executing "getLoggerName" method on unserialized object. An attacker can send serialized SoapClient object initialized in non-wsdl mode which will make PHP to parse remote XML-document automatically and thus enables him to read arbitrary files via XXE including vBulletin configuration file.How to fixUpdate your software up to the latest versionAdvisory status07.02.2013 - Vendor gets vulnerability details 11.02.2013 - Vendor releases fixed version and details 23.10.2013 - Public disclosureCreditsThe vulnerability was detected by Arseny Reutov, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2013-15 Reports on the vulnerabilities previously discovered by Positive Research:http://www.ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/