Step 1: Crafting the Malicious URL: The attacker constructs a URL that exploits the vulnerability. This URL typically targets the forum/login.php script with the lostpw action and includes a malicious URL in the url parameter.
Step 2: Social Engineering: The attacker distributes the crafted URL through phishing emails, social media, or other channels, enticing users to click the link, often by pretending to be a password reset request.
Step 3: User Interaction: A user clicks the malicious link, initiating the password reset process. The lostpw action is triggered.
Step 4: Redirection: The vulnerable forum/login.php script, due to the lack of proper validation, redirects the user to the URL specified in the url parameter, which is now the attacker's phishing site.
Step 5: Credential Harvesting: The user, believing they are on a legitimate vBulletin site, enters their credentials on the phishing page. The attacker captures these credentials.