CVE-2017-14143
CRITICALKaltura <13.2.0 - Code Injection
Title source: llmDescription
The getUserzoneCookie function in Kaltura before 13.2.0 uses a hardcoded cookie secret to validate cookie signatures, which allows remote attackers to bypass an intended protection mechanism and consequently conduct PHP object injection attacks and execute arbitrary PHP code via a crafted userzone cookie.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/43876
metasploit
WORKING POC
EXCELLENT
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/kaltura_unserialize_cookie_rce.rb
exploitdb
WORKING POC
VERIFIED
by Robin Verton · pythonwebappsphp
https://www.exploit-db.com/exploits/43028
References (5)
Scores
CVSS v3
9.8
EPSS
0.7745
EPSS Percentile
99.0%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-798
Status
draft
Affected Products (1)
kaltura/kaltura_server
< mercury-13.1.0
Timeline
Published
Sep 19, 2017
Tracked Since
Feb 18, 2026