File tree Expand file tree Collapse file tree 1 file changed +1
-1
lines changed
modules/exploits/unix/webapp Expand file tree Collapse file tree 1 file changed +1
-1
lines changed Original file line number Diff line number Diff line change @@ -18,7 +18,7 @@ def initialize(info = {})
18
18
abused to allow authenticated users to execute arbitrary code with the permissions of the
19
19
web server. The dangerous unserialize() call exists in the 'src/www/project/register.php'
20
20
file. The exploit abuses the destructor method from the Jabbex class in order to reach a
21
- call_user_func_array() call in the Jabbex class and call the fetchPostActions() method from
21
+ call_user_func_array() call in the Jabber class and call the fetchPostActions() method from
22
22
the Transition_PostAction_FieldFactory class to execute PHP code through an eval() call. In
23
23
order to work, the target must have the 'sys_create_project_in_one_step' option disabled.
24
24
} ,
You can’t perform that action at this time.
0 commit comments