HTTP: vBulletin DecodeArguments PHP Object Injection Attempt

This signature detects attempts to exploit a known PHP object injection vulnerability in vBulletin. In a successful code injection attack, the behavior of the target host is entirely dependent on the intended function of the injected code and executes within the security context of the currently logged in user. If the attack is unsuccessful, the vulnerable application can terminate abnormally.

Extended Description

The vB_Api_Hook::decodeArguments method in vBulletin 5 Connect 5.1.2 through 5.1.9 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object in the arguments parameter to ajax/api/hook/decodeArguments.

Affected Products

Vbulletin vbulletin

References

CVE: CVE-2015-7808

Short Name
HTTP:PHP:VBULLETIN-PHP-OBJ-INJ
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Attempt CVE-2015-7808 DecodeArguments Injection Object PHP vBulletin
Release Date
09/08/2016
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3337
False Positive
Unknown
Vendors

Vbulletin

CVSS Score

7.5

Found a potential security threat?