How To Use Owasp Vbscan? – POFTUT

How To Use Owasp Vbscan?

VBscan is a security tool used to scan and find vulnerabilities in vBulletin forums. As we know these type of software have a lot of vulnerabilities to exploit and attackers use these very good. Credits goes to Mohammed Reza Espargham


Installing Vbscan is just getting perl code from github.

$ git clone && cd vbscan 
Cloning into 'vbscan'... 
remote: Counting objects: 166, done. 
remote: Compressing objects: 100% (3/3), done. 
remote: Total 166 (delta 0), reused 0 (delta 0), pack-reused 163 
Receiving objects: 100% (166/166), 75.03 KiB | 0 bytes/s, done. 
Resolving deltas: 100% (76/76), done. 
Checking connectivity... done.

Start Scan with Vbscan

Starting is easy as just one command and there is no much alternative options. For security reasons we will use domain name as but the actual site is real.

$ perl ""

It will try some exploits and output the findings to the terminal and as html.


Details about the Vbscan

   _  _  ____  ___   ___    __    _  _ 
 ( \/ )(  _ \/ __) / __)  /__\  ( \( ) 
  \  /  ) _ <\__ \( (__  /(__)\  )  ( 
   \/  (____/(___/ \___)(__)(__)(_)\_) 
    --=[OWASP VBScan 
    +---++---==[Version : 0.1.7 
    +---++---==[Update Date : [2016/10/15] 
    +---++---==[Author : Mohammad Reza Espargham 
    +---++---==[Website : 
    --=[Code name : Larry Wall 
     @OWASP_VBScan , @rezesp , @OWASP 
Processing ...

Firewall Status

This part will provide information about VBulletin based Firewall existince

[+] Detecting Vbulletin based Firewall 
[++] No known firewall detected

vBulletin Version

The vBulletin version is 3.8.9

[+] Detecting vBulletin Version 
[++] vBulletin 3.8.9


This part will provide information about CVE based vulnerabilities

[++] vBulletin CVE-2016-6483 Server Side Request Forgery Security Bypass Vulnerability 


License information

[+] vBulletin LICENSE Check 
[++] vBulletin LICENSE file :

Apache Info

The web server running VBulletin web applications

[+] Checking apache info/status files 
[++] Readable info/status files are not found

Admin Control Panel

Admin and remote access pages information is provided.

[+] Checking admincp/modcp path 
[++] admincp Found 
[++] modcp Found


Checks if validator.php exists

[+] Checking validator.php 
[++] validator.php is not found


Checking robots.txt file which is used by site crawling bots. This can provide interesting and valuable information.

[+] Checking robots.txt existing  
[++] robots.txt is found  
path :   
Interesting path found from robots.txt                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            

c99 Xml Shell

This is an old vulnerability

[+] Checking c99 xml shell in admincp/subscriptions.php                                                                               
[++] c99 xml shell is Not Found

Backup Files

Can we access the backup files. This can occur  in misconfiguration situations.

[+] Finding common backup files name                                                                                                  
[++] Backup files are not found

Log Files

Can we access the logs files

[+] Finding common log files name                                                                                                     
[++] error log is not found

Config Files

We have found config files where database username and password exists

[+] Checking config.php.x for disclure config file                                                                                    
[++] Readable config file is found                                                                                                    
 config file path :                                                                   
Readable config file is found                                                                                                         
 config file path :

RCE Backdoor

Are the any remote code execution backdoor?

[+] Checking faq.php RCE backdoor                                                                                                     
[++] Remote Code Execute backdoor not found


This check is done whether to learn there is Local File Inclusion vulnerability

[+] Checking vBSEO 3.x - LFI (Local File Inclusion) vulnerability                                                                     
[++] vbseo.php LFI is not vulnerable

Sql Injection

We will check the arcade.php if there is an sql injection vulnerability.

[+] Checking arcade.php SQLI Vulnerability                                                                                            
[++] arcade.php not found


LEARN MORE  Backup and Restore MySQL Databases With Mysqldump In Linux

How To Use Owasp Vbscan? Infografic

How To Use Owasp Vbscan? Infografic
How To Use Owasp Vbscan? Infografic


2 thoughts on “How To Use Owasp Vbscan?”

  1. I am from Slovenia. I can help with build this forum. Thanks for approved.

    Jaz sem Slovenka. Lahko pomagam pri razvoju foruma.


Leave a Comment