Skip to content

Conversation

@Chocapikk
Copy link
Contributor

Template / PR Information

Relying on Content-Type: application/json to detect the vulnerability is unreliable, because many vBulletin installations, especially across different 5.x and early 6.x versions return HTML. In some builds the initial ajax/api/ad/replaceAdTemplate call may inject the <vb:if> correctly but won't echo your var_dump result in its response, so your scanner appears to miss the issue. By following up with a second POST to ajax/render/ad_<location>, you force the template to be rendered and can reliably capture the string(<length>) "<value>" output, regardless of whether the first response looked like JSON or HTML. This approach ensures you don't miss exploitable instances simply because the server hides its output behind an unexpected content type.

@DhiyaneshGeek DhiyaneshGeek self-assigned this May 27, 2025
@DhiyaneshGeek DhiyaneshGeek added good first issue Good for newcomers Done Ready to merge labels May 27, 2025
@DhiyaneshGeek
Copy link
Member

Hi @Chocapikk

Thank you so much for updating the template and contributing to the project. 🍻

You can grab some cool PD stickers over here http://nux.gg/stickers 😄

You can join our discord server. It's a great place to connect with fellow contributors and stay updated with the latest developments. Thank you once again

@ritikchaddha ritikchaddha merged commit ff9642a into projectdiscovery:main May 31, 2025
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Done Ready to merge good first issue Good for newcomers

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants