An exploit in our input validation has recently been discovered. This could allow a brute force attack to comprise and spoof input data for a given user. To resolve this issue, it is necessary to release a patch level version of the active versions of vBulletin.
The upgrade process is the same as previous patch level releases - simply download the patch from the Members Area, extract the files and upload to your webserver, overwriting the existing files. There is no upgrade script required.
As with all security-based releases, we recommend that all customers upgrade as soon as possible in order to prevent any potential damage resulting from the flaw being exploited.
If you are already running 3.7.6, 3.8.4 or 4.0.0, the process you will be required to follow to make your board immune to this flaw is very simple.
There is no need to run an upgrade script if you are already running the latest version.
Visit the Patches section of the vBulletin Members' Area () and download the patch for the version you are using, then extract the files from the archive you downloaded, then upload the files to your board via FTP etc., overwriting the existing files. This will update your version to the latest patch release. Upgrading from an earlier version
If you are not already running 3.7.6 or 3.8.4, you should download the latest version from the Members' Area and perform an upgrade as normal. Full instructions for upgrading vBulletin are available here.
Download vBulletin 4.0.0 PL1 / 3.8.4 PL2 / 3.7.6 PL 2
http://www.vbulletin.com/docs/html/upgrade
As usual, the version released today is available for all customers with valid, active licenses to download from the vBulletin Members' Area.
http://members.vbulletin.com