Skip to content

Commit edc0861

Browse files
authored
Merge pull request #1 from bwatters-r7/land-7266
Minor Grammar Changes.
2 parents 3854286 + 513d8a8 commit edc0861

File tree

2 files changed

+13
-12
lines changed

2 files changed

+13
-12
lines changed

documentation/modules/exploit/linux/http/kaltura_unserialize_rce.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
## Vulnerable Application
22

3-
This module exploits a Object Injection vulnerability in Kaltura. By exploiting this vulnerability, unauthenticated users can execute arbitrary code under the context of the web server user.
3+
This module exploits an Object Injection vulnerability in Kaltura. By exploiting this vulnerability, unauthenticated users can execute arbitrary code under the context of the web server user.
44

5-
Kaltura has a module named keditorservices that takes user input and then use it as an unserialize function parameter. The object constructed is based on the SektionEins Zend code execution POP chain PoC, with a minor modification to ensure Kaltura processes it and the Zend_Log function's __destruct() method is called. Kaltura prior to 11.1.0-2 versions are affected by issue.
5+
Kaltura has a module named keditorservices that takes user input and then uses it as an unserialized function parameter. The object constructed is based on the SektionEins Zend code execution POP chain PoC, with a minor modification to ensure Kaltura processes it and the Zend_Log function's __destruct() method is called. Kaltura prior to 11.1.0-2 versions are affected by issue.
66

77
**Vulnerable Application Installation Steps**
88

9-
Kaltura has their own RPM and/or DEB packages to helps us to install it without any issue. Following steps are slightly different than official wiki in order to install vulnerable packages.
9+
Kaltura has their own RPM and/or DEB packages to help us to install it without any issue. Following steps are slightly different than official wiki in order to install the vulnerable packages.
1010

11-
Following steps are valid CentOS 6 x64 bit operating system.
11+
Following steps are valid on the CentOS 6 x64 bit operating system.
1212

13-
1. Install CentOS-6 x64 and run `yum update -y` in order to fetch and install latests packages. Also set hostname something like _kalturahack.dev_ would be wise. Because it will be used during Kaltura installation.
13+
1. Install CentOS-6 x64 and run `yum update -y` in order to fetch and install the latest packages. Also seting the hostname to something like _kalturahack.dev_ would be wise, because it will be used during Kaltura installation.
1414
2. Disable iptables and selinux.
1515
```
1616
iptables -F
@@ -29,7 +29,7 @@ setenforce permissive
2929
rpm -ihv http://installrepo.kaltura.org/releases/kaltura-release.noarch.rpm
3030
```
3131

32-
5. Kaltura repo configures for latest version by default. We need to change it to one of the vulnerable release. Thus, open `/etc/yum.repos.d/kaltura.repo` file with your favorite text editor and perform following replacement.
32+
5. Kaltura repo is configured for the latest version by default. We need to change it to one of the vulnerable releases. Thus, open `/etc/yum.repos.d/kaltura.repo` file with your favorite text editor and perform following replacement.
3333

3434
Original file. (# lines just ignored)
3535
```
@@ -66,13 +66,13 @@ enabled = 1
6666
baseurl = http://installrepo.kaltura.org/releases/latest/RPMS/$basearch/
6767
```
6868

69-
6. Install kaltura-server. This will take for a while.
69+
6. Install kaltura-server. This will take a while.
7070
```
7171
yum clean all
7272
yum install kaltura-server
7373
```
7474

75-
7. Run following commands in order to initiate database and start necessary services.
75+
7. Run the following commands in order to initiate the database and start necessary services.
7676
```
7777
/opt/kaltura/bin/kaltura-mysql-settings.sh
7878
service memcached restart
@@ -81,7 +81,7 @@ chkconfig memcached on
8181
chkconfig ntpd on
8282
```
8383

84-
8. Start kaltura configuration script `/opt/kaltura/bin/kaltura-config-all.sh` .
84+
8. Start the kaltura configuration script `/opt/kaltura/bin/kaltura-config-all.sh` .
8585

8686
```
8787
[Email\NO]: "<your email address>"

modules/exploits/linux/http/kaltura_unserialize_rce.rb

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,18 +12,19 @@ def initialize(info={})
1212
super(update_info(info,
1313
'Name' => 'Kaltura Remote PHP Code Execution',
1414
'Description' => %q{
15-
This module exploits a Object Injection vulnerability in Kaltura.
15+
This module exploits an Object Injection vulnerability in Kaltura.
1616
By exploiting this vulnerability, unauthenticated users can execute
1717
arbitrary code under the context of the web server user.
1818
1919
Kaltura has a module named keditorservices that takes user input
20-
and then use it as an unserialize function parameter. The object
20+
and then use it as an unserialized function parameter. The object
2121
constructed is based on the SektionEins Zend code execution POP chain PoC,
2222
with a minor modification to ensure Kaltura processes it and the
2323
Zend_Log function's __destruct() method is called. Kaltura prior to
2424
11.1.0-2 versions are affected by issue.
2525
26-
This module was tested against Kaltura 11.1.0 installation on Ubuntu server.
26+
This module was tested against Kaltura 11.1.0 installation on
27+
Ubuntu server and CentOS 6.8.
2728
},
2829
'License' => MSF_LICENSE,
2930
'Author' =>

0 commit comments

Comments
 (0)