7.5
CVSSv2

CVE-2015-7808

Published: 24/11/2015 Updated: 25/11/2015
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 761
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The vB_Api_Hook::decodeArguments method in vBulletin 5 Connect 5.1.2 up to and including 5.1.9 allows remote malicious users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object in the arguments parameter to ajax/api/hook/decodeArguments.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vbulletin vbulletin 5.0.3

vbulletin vbulletin 5.0.4

vbulletin vbulletin 5.0.5

vbulletin vbulletin 5.1.0

vbulletin vbulletin 5.1.9

vbulletin vbulletin 5.0.0

vbulletin vbulletin 5.0.2

vbulletin vbulletin 5.1.2

vbulletin vbulletin 5.1.5

vbulletin vbulletin 5.1.7

vbulletin vbulletin 5.1.3

vbulletin vbulletin 5.1.4

vbulletin vbulletin 5.0.1

vbulletin vbulletin 5.1.1

vbulletin vbulletin 5.1.6

vbulletin vbulletin 5.1.8

Exploits

# Exploit Title: Vbulletin 51X unserialize 0day preauth RCE exploit # Date: Nov 4th, 2015 # Exploit Author: hhjj # Vendor Homepage: wwwvbulletincom/ # Version: 51x # Tested on: Debian # CVE : # I did not discover this exploit, leaked from the IoT # Build the object php << 'eof' <?php class vB_Database { public $funct ...
#[+] Title: Vbulletin 5x - Remote Code Execution Exploit #[+] Product: vbulletin #[+] Vendor: vbulletincom #[+] Vulnerable Version(s): Vbulletin 5x # # # Author : Mohammad Reza Espargham # Linkedin : irlinkedincom/in/rezasp # E-Mail : me[at]reza[dot]es , rezaespargham[at]gmail[dot]com # Website : wwwr ...

Github Repositories

[Exploit] vBulletin 51x - PreAuth Remote Code Execution Exploit Title - [Exploit] vBulletin 51x - PreAuth Remote Code Execution Date - 11-09-2015 Requirements - Python 34x , Requests, Colorama Tested on - Windows 81 / Ubuntu 1404 CVE - CVE-2015-7808 Blog Post - mukarramkhalidcom/exploit-vbulletin-5-1-x-preauth-remote-code-execution/ ![Preview] (mukarramkh

PoC code for vBulletin PreAuth vulnerability

CVE-2015-7808 PoC code for vBulletin PreAuth vulnerability Usage: perl vbulletinpl wwwvbulletincom/forum id

Deserialize (De)serialize 101 What is (de)serialization ? (De)serialization allows for object portability serialization: It is the process of translating data structure or object state into byte format → store on disk, dbs, or trasmitted over the network deserialization: extract data structure from bytes Object → Serialize → Byte Stream Byte Stream → Unseria

[Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution

[Exploit] vBulletin 51x - PreAuth Remote Code Execution Exploit Title - [Exploit] vBulletin 51x - PreAuth Remote Code Execution Date - 11-09-2015 Requirements - Python 34x , Requests, Colorama Tested on - Windows 81 / Ubuntu 1404 CVE - CVE-2015-7808 Blog Post - mukarramkhalidcom/exploit-vbulletin-5-1-x-preauth-remote-code-execution/