Skip to content

Commit fb00d1c

Browse files
committed
Another minor grammer changes
1 parent edc0861 commit fb00d1c

File tree

2 files changed

+5
-6
lines changed

2 files changed

+5
-6
lines changed

documentation/modules/exploit/linux/http/kaltura_unserialize_rce.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22

33
This module exploits an Object Injection vulnerability in Kaltura. By exploiting this vulnerability, unauthenticated users can execute arbitrary code under the context of the web server user.
44

5-
Kaltura has a module named keditorservices that takes user input and then uses it as an unserialized function parameter. The object constructed is based on the SektionEins Zend code execution POP chain PoC, with a minor modification to ensure Kaltura processes it and the Zend_Log function's __destruct() method is called. Kaltura prior to 11.1.0-2 versions are affected by issue.
5+
Kaltura has a module named keditorservices that takes user input and then uses it as an unserialized function parameter. The constructed object is based on the SektionEins Zend code execution POP chain PoC, with a minor modification to ensure Kaltura processes it and the Zend_Log function's __destruct() method is called. Kaltura versions prior to 11.1.0-2 are affected by this issue.
66

77
**Vulnerable Application Installation Steps**
88

99
Kaltura has their own RPM and/or DEB packages to help us to install it without any issue. Following steps are slightly different than official wiki in order to install the vulnerable packages.
1010

1111
Following steps are valid on the CentOS 6 x64 bit operating system.
1212

13-
1. Install CentOS-6 x64 and run `yum update -y` in order to fetch and install the latest packages. Also seting the hostname to something like _kalturahack.dev_ would be wise, because it will be used during Kaltura installation.
13+
1. Install CentOS-6 x64 and run `yum update -y` in order to fetch and install the latest packages. Also setting the hostname to something like _kalturahack.dev_ would be wise, because it will be used during Kaltura installation.
1414
2. Disable iptables and selinux.
1515
```
1616
iptables -F

modules/exploits/linux/http/kaltura_unserialize_rce.rb

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,10 @@ def initialize(info={})
2020
and then use it as an unserialized function parameter. The object
2121
constructed is based on the SektionEins Zend code execution POP chain PoC,
2222
with a minor modification to ensure Kaltura processes it and the
23-
Zend_Log function's __destruct() method is called. Kaltura prior to
24-
11.1.0-2 versions are affected by issue.
23+
Zend_Log function's __destruct() method is called. Kaltura versions
24+
prior to 11.1.0-2 are affected by this issue.
2525
26-
This module was tested against Kaltura 11.1.0 installation on
27-
Ubuntu server and CentOS 6.8.
26+
This module was tested against Kaltura 11.1.0 installed on CentOS 6.8.
2827
},
2928
'License' => MSF_LICENSE,
3029
'Author' =>

0 commit comments

Comments
 (0)