Skip to content

Commit d01a07b

Browse files
committed
Add requirement to description
1 parent fd09b5c commit d01a07b

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

modules/exploits/unix/webapp/tuleap_unserialize_exec.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,8 @@ def initialize(info = {})
1919
web server. The dangerous unserialize() call exists in the 'src/www/project/register.php'
2020
file. The exploit abuses the destructor method from the Jabbex class in order to reach a
2121
call_user_func_array() call in the Jabbex class and call the fetchPostActions() method from
22-
the Transition_PostAction_FieldFactory class to execute PHP code through an eval() call.
22+
the Transition_PostAction_FieldFactory class to execute PHP code through an eval() call. In
23+
order to work, the target must have the 'sys_create_project_in_one_step' option disabled.
2324
},
2425
'License' => MSF_LICENSE,
2526
'Author' => 'EgiX',

0 commit comments

Comments
 (0)