Skip to content

Commit 9908e0e

Browse files
author
Tod Beardsley
committed
Land rapid7#4384, fix typo.
2 parents 50b734f + 008c33f commit 9908e0e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/exploits/unix/webapp/tuleap_unserialize_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def initialize(info = {})
1818
abused to allow authenticated users to execute arbitrary code with the permissions of the
1919
web server. The dangerous unserialize() call exists in the 'src/www/project/register.php'
2020
file. The exploit abuses the destructor method from the Jabbex class in order to reach a
21-
call_user_func_array() call in the Jabbex class and call the fetchPostActions() method from
21+
call_user_func_array() call in the Jabber class and call the fetchPostActions() method from
2222
the Transition_PostAction_FieldFactory class to execute PHP code through an eval() call. In
2323
order to work, the target must have the 'sys_create_project_in_one_step' option disabled.
2424
},

0 commit comments

Comments
 (0)