The getUserzoneCookie function in Kaltura before 13.2.0 uses a hardcoded cookie secret to validate cookie signatures, which allows remote attackers to bypass an intended protection mechanism and consequently conduct PHP object injection attacks and execute arbitrary PHP code via a crafted userzone cookie.
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
https://github.com/kaltura/server/commit/6a6d14328b7a1493e8c47f9565461e5f88be20c9#diff-0770640cc76112cbf77bebc604852682 | third party advisory |
https://www.exploit-db.com/exploits/43028/ | exploit |
https://www.exploit-db.com/exploits/43876/ | exploit |
https://telekomsecurity.github.io/assets/advisories/20170912_kaltura-advisory.txt | third party advisory exploit |
http://www.securityfocus.com/bid/100976 | third party advisory vdb entry |