Skip to content

Commit 718c215

Browse files
Chocapikkjvoisin
andauthored
Update modules/exploits/multi/http/spip_porte_plume_previsu_rce.rb
Co-authored-by: Julien Voisin <[email protected]>
1 parent 3d90eb0 commit 718c215

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

modules/exploits/multi/http/spip_porte_plume_previsu_rce.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,8 @@ def initialize(info = {})
1919
This module exploits a Remote Code Execution vulnerability in SPIP versions up to and including 4.2.12.
2020
The vulnerability occurs in SPIP’s templating system where it incorrectly handles user-supplied input,
2121
allowing an attacker to inject and execute arbitrary PHP code. This can be achieved by crafting a
22-
payload that manipulates the templating data processed by the `echappe_retour()` function, which invokes
23-
`traitements_previsu_php_modeles_eval()`, containing an `eval()` call.
22+
payload manipulating the templating data processed by the `echappe_retour()` function, invoking
23+
`traitements_previsu_php_modeles_eval()`, which contains an `eval()` call.
2424
},
2525
'Author' => [
2626
'Valentin Lobstein', # Metasploit module author

0 commit comments

Comments
 (0)