We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
2 parents 50b734f + 008c33f commit 9908e0eCopy full SHA for 9908e0e
1 file changed
modules/exploits/unix/webapp/tuleap_unserialize_exec.rb
@@ -18,7 +18,7 @@ def initialize(info = {})
18
abused to allow authenticated users to execute arbitrary code with the permissions of the
19
web server. The dangerous unserialize() call exists in the 'src/www/project/register.php'
20
file. The exploit abuses the destructor method from the Jabbex class in order to reach a
21
- call_user_func_array() call in the Jabbex class and call the fetchPostActions() method from
+ call_user_func_array() call in the Jabber class and call the fetchPostActions() method from
22
the Transition_PostAction_FieldFactory class to execute PHP code through an eval() call. In
23
order to work, the target must have the 'sys_create_project_in_one_step' option disabled.
24
},
0 commit comments