File tree Expand file tree Collapse file tree 1 file changed +4
-3
lines changed
modules/exploits/linux/http Expand file tree Collapse file tree 1 file changed +4
-3
lines changed Original file line number Diff line number Diff line change @@ -12,18 +12,19 @@ def initialize(info={})
12
12
super ( update_info ( info ,
13
13
'Name' => 'Kaltura Remote PHP Code Execution' ,
14
14
'Description' => %q{
15
- This module exploits a Object Injection vulnerability in Kaltura.
15
+ This module exploits an Object Injection vulnerability in Kaltura.
16
16
By exploiting this vulnerability, unauthenticated users can execute
17
17
arbitrary code under the context of the web server user.
18
18
19
19
Kaltura has a module named keditorservices that takes user input
20
- and then use it as an unserialize function parameter. The object
20
+ and then use it as an unserialized function parameter. The object
21
21
constructed is based on the SektionEins Zend code execution POP chain PoC,
22
22
with a minor modification to ensure Kaltura processes it and the
23
23
Zend_Log function's __destruct() method is called. Kaltura prior to
24
24
11.1.0-2 versions are affected by issue.
25
25
26
- This module was tested against Kaltura 11.1.0 installation on Ubuntu server.
26
+ This module was tested against Kaltura 11.1.0 installation on
27
+ Ubuntu server and CentOS 6.8.
27
28
} ,
28
29
'License' => MSF_LICENSE ,
29
30
'Author' =>
You can’t perform that action at this time.
0 commit comments