We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent fb00d1c commit 0f16393Copy full SHA for 0f16393
modules/exploits/linux/http/kaltura_unserialize_rce.rb
@@ -17,8 +17,8 @@ def initialize(info={})
17
arbitrary code under the context of the web server user.
18
19
Kaltura has a module named keditorservices that takes user input
20
- and then use it as an unserialized function parameter. The object
21
- constructed is based on the SektionEins Zend code execution POP chain PoC,
+ and then use it as an unserialized function parameter. The constructed
+ object is based on the SektionEins Zend code execution POP chain PoC,
22
with a minor modification to ensure Kaltura processes it and the
23
Zend_Log function's __destruct() method is called. Kaltura versions
24
prior to 11.1.0-2 are affected by this issue.
0 commit comments