File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed
modules/exploits/multi/http Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change @@ -19,8 +19,8 @@ def initialize(info = {})
19
19
This module exploits a Remote Code Execution vulnerability in SPIP versions up to and including 4.2.12.
20
20
The vulnerability occurs in SPIP’s templating system where it incorrectly handles user-supplied input,
21
21
allowing an attacker to inject and execute arbitrary PHP code. This can be achieved by crafting a
22
- payload that manipulates the templating data processed by the `echappe_retour()` function, which invokes
23
- `traitements_previsu_php_modeles_eval()`, containing an `eval()` call.
22
+ payload manipulating the templating data processed by the `echappe_retour()` function, invoking
23
+ `traitements_previsu_php_modeles_eval()`, which contains an `eval()` call.
24
24
} ,
25
25
'Author' => [
26
26
'Valentin Lobstein' , # Metasploit module author
You can’t perform that action at this time.
0 commit comments