module

Kaltura Remote PHP Code Execution

Disclosed
2016-03-15
Created
2018-05-30

Description

This module exploits an Object Injection vulnerability in Kaltura.
By exploiting this vulnerability, unauthenticated users can execute
arbitrary code under the context of the web server user.

Kaltura has a module named keditorservices that takes user input
and then uses it as an unserialized function parameter. The constructed
object is based on the SektionEins Zend code execution POP chain PoC,
with a minor modification to ensure Kaltura processes it and the
Zend_Log function's __destruct() method is called. Kaltura versions
prior to 11.1.0-2 are affected by this issue.

This module was tested against Kaltura 11.1.0 installed on CentOS 6.8.

Authors

Security-Assessment.com
Mehmet Ince mehmet@mehmetince.net

Platform

PHP

Architectures

php

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/linux/http/kaltura_unserialize_rce
msf exploit(kaltura_unserialize_rce) > show targets
...targets...
msf exploit(kaltura_unserialize_rce) > set TARGET < target-id >
msf exploit(kaltura_unserialize_rce) > show options
...show and set options...
msf exploit(kaltura_unserialize_rce) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.