Vulnerability Description
The getUserzoneCookie function in Kaltura before 13.2.0 uses a hardcoded cookie secret to validate cookie signatures, which allows remote attackers to bypass an intended protection mechanism and consequently conduct PHP object injection attacks and execute arbitrary PHP code via a crafted userzone cookie.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kaltura | Kaltura Server | <= mercury-13.1.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/100976Third Party AdvisoryVDB Entry
- https://github.com/kaltura/server/commit/6a6d14328b7a1493e8c47f9565461e5f88be20cThird Party Advisory
- https://telekomsecurity.github.io/assets/advisories/20170912_kaltura-advisory.txExploitThird Party Advisory
- https://www.exploit-db.com/exploits/43028/
- https://www.exploit-db.com/exploits/43876/
- http://www.securityfocus.com/bid/100976Third Party AdvisoryVDB Entry
- https://github.com/kaltura/server/commit/6a6d14328b7a1493e8c47f9565461e5f88be20cThird Party Advisory
- https://telekomsecurity.github.io/assets/advisories/20170912_kaltura-advisory.txExploitThird Party Advisory
- https://www.exploit-db.com/exploits/43028/
- https://www.exploit-db.com/exploits/43876/
FAQ
What is CVE-2017-14143?
CVE-2017-14143 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The getUserzoneCookie function in Kaltura before 13.2.0 uses a hardcoded cookie secret to validate cookie signatures, which allows remote attackers to bypass an intended protection mechanism and conse...
How severe is CVE-2017-14143?
CVE-2017-14143 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-14143?
Check the references section above for vendor advisories and patch information. Affected products include: Kaltura Kaltura Server.