We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent fd09b5c commit d01a07bCopy full SHA for d01a07b
modules/exploits/unix/webapp/tuleap_unserialize_exec.rb
@@ -19,7 +19,8 @@ def initialize(info = {})
19
web server. The dangerous unserialize() call exists in the 'src/www/project/register.php'
20
file. The exploit abuses the destructor method from the Jabbex class in order to reach a
21
call_user_func_array() call in the Jabbex class and call the fetchPostActions() method from
22
- the Transition_PostAction_FieldFactory class to execute PHP code through an eval() call.
+ the Transition_PostAction_FieldFactory class to execute PHP code through an eval() call. In
23
+ order to work, the target must have the 'sys_create_project_in_one_step' option disabled.
24
},
25
'License' => MSF_LICENSE,
26
'Author' => 'EgiX',
0 commit comments