update description
parent
d80a7e662f
commit
595645bcd7
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'Joomla HTTP Header Unauthenticated Remote Code Execution',
|
||||
'Description' => %q{
|
||||
Joomla suffers from an unauthenticated remote code execution that affects all versions from 1.5 to 3.4.
|
||||
Joomla suffers from an unauthenticated remote code execution that affects all versions from 1.5.0 to 3.4.5.
|
||||
By storing user supplied headers in the databases session table it's possible to truncate the input
|
||||
by sending an UTF-8 character. The custom created payload is then executed once the session is read
|
||||
from the databse. You also need to have a PHP version before 5.4.45 (including 5.3.x), 5.5.29 or 5.6.13.
|
||||
|
|
Loading…
Reference in New Issue