2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2015-7808" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2015-11-24T20:59:07.983" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T02:37:26.547" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The vB_Api_Hook::decodeArguments method in vBulletin 5 Connect 5.1.2 through 5.1.9 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object in the arguments parameter to ajax/api/hook/decodeArguments."
} ,
{
"lang" : "es" ,
"value" : "El m\u00e9todo vB_Api_Hook::decodeArguments en vBulletin 5 Connect 5.1.2 hasta la versi\u00f3n 5.1.9 permite a atacantes remotos realizar inyecci\u00f3n de objeto PHP y ejecutar c\u00f3digo PHP arbitrario a trav\u00e9s de un objeto serializado manipulado en el par\u00e1metro arguments en ajax/api/hook/decodeArguments."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-20"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8006A061-0338-42C7-B8B8-BCD3122C8CAE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "59BEB3C4-2086-4963-A891-9683D09A7ECD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C06FA106-6A5A-4C88-A79B-69CDBE34F7C1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "57B7913E-2449-4638-9D13-01F56324D68C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6A94474-EB3E-45B8-8790-75554BB1F068"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.0.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "607D650E-AFEB-47F8-90C1-C8BA132659C7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C77C657C-3C09-47AE-8FEC-18556FDEB040"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.1.0:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "7CA8DD4F-85CE-4598-8968-87B839DF25EC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3BB7F7A4-1AFD-4391-B53C-07F1C9EE7A07"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FE2B6D53-270C-48BB-B3D0-DDB8E700290D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.1.2:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "2737015A-6FBC-4B64-9BE3-A1570B095D06"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.1.2:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "AB60E2A1-CE50-49FF-AFA3-25BD72AE2A4E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.1.2:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "78BB8D71-5348-4879-A6DD-8AE599719F57"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DCEBB968-6521-4696-BDFA-565467666107"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.1.3:alpha5:*:*:*:*:*:*" ,
"matchCriteriaId" : "C9A3CE21-9777-45C0-B239-BFA0DE8F2375"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.1.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2478BF04-3E02-4EC5-B6F5-B3CA86E359B8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.1.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "691A1E45-7448-4A25-B2F4-B11C0927D9B5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.1.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D2724DB6-4747-4446-A7BE-096989601132"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.1.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9A60AACC-8F85-492A-B534-73BEEC89D35F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.1.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C4C521F8-10C0-4C26-801F-55325B5BE894"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vbulletin:vbulletin:5.1.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2C4912FC-6739-4C2A-8442-13AEDDC5B34B"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://blog.checkpoint.com/2015/11/05/check-point-discovers-critical-vbulletin-0-day/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://packetstormsecurity.com/files/134331/vBulletin-5.1.2-Unserialize-Code-Execution.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://pastie.org/pastes/10527766/text?key=wq1hgkcj4afb9ipqzllsq" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.rapid7.com/db/modules/exploit/multi/http/vbulletin_unserialize" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "https://blog.sucuri.net/2015/11/vbulletin-exploits-in-the-wild.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "https://www.exploit-db.com/exploits/38629/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://blog.checkpoint.com/2015/11/05/check-point-discovers-critical-vbulletin-0-day/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://packetstormsecurity.com/files/134331/vBulletin-5.1.2-Unserialize-Code-Execution.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://pastie.org/pastes/10527766/text?key=wq1hgkcj4afb9ipqzllsq" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.rapid7.com/db/modules/exploit/multi/http/vbulletin_unserialize" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "https://blog.sucuri.net/2015/11/vbulletin-exploits-in-the-wild.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "https://www.exploit-db.com/exploits/38629/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
2023-04-24 12:24:31 +02:00
}
]
}