Vulnerability & Exploit Database

Back to search

Magento 2.0.6 Unserialize Remote Code Execution

This module exploits a PHP object injection vulnerability in Magento 2.0.6 or prior.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/multi/http/magento_unserialize

Authors

  • Netanel Rubin
  • agix
  • mr_me <mr_me [at] offensive-security.com>

References

Targets

  • Automatic Targeting

Platforms

  • php

Architectures

  • php

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/multi/http/magento_unserialize msf exploit(magento_unserialize) > show targets ...targets... msf exploit(magento_unserialize) > set TARGET <target-id> msf exploit(magento_unserialize) > show options ...show and set options... msf exploit(magento_unserialize) > exploit