### [CVE-2015-7808](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7808) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The vB_Api_Hook::decodeArguments method in vBulletin 5 Connect 5.1.2 through 5.1.9 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object in the arguments parameter to ajax/api/hook/decodeArguments. ### POC #### Reference - http://blog.checkpoint.com/2015/11/05/check-point-discovers-critical-vbulletin-0-day/ - http://packetstormsecurity.com/files/134331/vBulletin-5.1.2-Unserialize-Code-Execution.html - https://www.exploit-db.com/exploits/38629/ #### Github - https://github.com/0neXo0r/Exploits - https://github.com/0x43f/Exploits - https://github.com/ARPSyndicate/cvemon - https://github.com/PleXone2019/vBulletin-5.1.x-PreAuth-RCE - https://github.com/Prajithp/CVE-2015-7808 - https://github.com/R0B1NL1N/E-x-p-l-o-i-t-s - https://github.com/SexyBeast233/SecBooks - https://github.com/Xcod3bughunt3r/ExploitsTools - https://github.com/XiphosResearch/exploits - https://github.com/dr4v/exploits - https://github.com/jmedeng/suriya73-exploits - https://github.com/mukarramkhalid/vBulletin-5.1.x-PreAuth-RCE - https://github.com/shildenbrand/Exploits - https://github.com/tthseus/Deserialize - https://github.com/xkon/vulBox