The vB_Api_Hook::decodeArguments method in vBulletin 5 Connect 5.1.2 up to and including 5.1.9 allows remote malicious users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object in the arguments parameter to ajax/api/hook/decodeArguments.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
vbulletin vbulletin 5.0.3 |
||
vbulletin vbulletin 5.0.4 |
||
vbulletin vbulletin 5.0.5 |
||
vbulletin vbulletin 5.1.0 |
||
vbulletin vbulletin 5.1.9 |
||
vbulletin vbulletin 5.0.0 |
||
vbulletin vbulletin 5.0.2 |
||
vbulletin vbulletin 5.1.2 |
||
vbulletin vbulletin 5.1.5 |
||
vbulletin vbulletin 5.1.7 |
||
vbulletin vbulletin 5.1.3 |
||
vbulletin vbulletin 5.1.4 |
||
vbulletin vbulletin 5.0.1 |
||
vbulletin vbulletin 5.1.1 |
||
vbulletin vbulletin 5.1.6 |
||
vbulletin vbulletin 5.1.8 |