CVE-2017-14143

CRITICAL

Kaltura <13.2.0 - Code Injection

Title source: llm

Description

The getUserzoneCookie function in Kaltura before 13.2.0 uses a hardcoded cookie secret to validate cookie signatures, which allows remote attackers to bypass an intended protection mechanism and consequently conduct PHP object injection attacks and execute arbitrary PHP code via a crafted userzone cookie.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/43876
metasploit WORKING POC EXCELLENT
by Robin Verton <[email protected]>, Mehmet Ince <[email protected]> · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/kaltura_unserialize_cookie_rce.rb
exploitdb WORKING POC VERIFIED
by Robin Verton · pythonwebappsphp
https://www.exploit-db.com/exploits/43028

Scores

CVSS v3 9.8
EPSS 0.7745
EPSS Percentile 99.0%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-798
Status draft

Affected Products (1)

kaltura/kaltura_server < mercury-13.1.0

Timeline

Published Sep 19, 2017
Tracked Since Feb 18, 2026