This patch strengthens the security of the AdminCP to prevent a reported XSS attack in vBulletin versions 4.1.3, 4.1.4 and 4.1.5. To resolve this issue, it has been necessary to release a patch level version for these three versions only. The issue is limited to certain browsers only, and does not affect versions of vBulletin prior to 4.1.3.
The patching process is the same as previous patch level releases - simply download the patch from the Members Area, extract the files and upload to your webserver, overwriting the existing files. There is no upgrade script required.
As with all security-based releases, we recommend that all customers upgrade as soon as possible in order to prevent any potential damage resulting from the flaw being exploited.
Patching Versions 4.1.3, 4.1.4 and 4.1.5
The process you will be required to follow to make your board immune to this flaw is very simple.
Visit the Patches section of the vBulletin Members' Area and download the patch for the version you are using, then extract the files from the archive you downloaded, then upload the files to your board via FTP etc., overwriting the existing files. This will update your version to the PL release.
Upgrading from Versions Earlier than 4.1.3
If you are not already running 4.1.3+, we have updated the downloadable version of our software, so you can download version 4.1.3, 4.1.4 and 4.1.5 from the Members' Area and perform an upgrade as normal.
Full instructions for upgrading vBulletin are available here.