You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: documentation/modules/exploit/multi/http/lighthouse_studio_unauth_rce_CVE_2025_34300.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -317,8 +317,9 @@ Use this instruction to upload manually [Manual Upload to Server](https://sawtoo
317
317
318
318
- Avoid installing 5.40 as it's missing some essential MySQL libraries required to connect the Lighthouse survey to database which is required in order to exploit this vulnerability
319
319
320
-
3. Either find and replace these with #!C:/Strawberry/perl/bin/perl.exe or edit the apache config such that Apache will always send these files to Strawberry Perl
321
-
- The .pl and .cgi files LightHouse generates will start with #!/usr/bin/pearl which windows will fail to interpret
320
+
3. The `.pl` and `.cgi` files LightHouse generates will start with `#!/usr/bin/perl` which Windows will fail to interpret
321
+
- Either find and replace these with `#!C:/Strawberry/perl/bin/perl.exe` or edit the apache config such that Apache will always send these files to Strawberry Perl
322
+
322
323
323
324
4. Make the same edits to the Apache config as you would do on Linux to make the cgi scripts executable
0 commit comments