The callme_startcall function in recordings/misc/callme_page.php in FreePBX 2.9, 2.10, and earlier allows remote attackers to execute arbitrary commands via the callmenum parameter in a c action.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.org/files/111028/FreePBX-2.10.0-Remote-Command-Execution-XSS.html - | |
References | () http://seclists.org/fulldisclosure/2012/Mar/234 - | |
References | () http://secunia.com/advisories/48463 - Vendor Advisory | |
References | () http://www.exploit-db.com/exploits/18649 - Exploit | |
References | () http://www.exploit-db.com/exploits/18659 - | |
References | () http://www.freepbx.org/trac/ticket/5711 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/52630 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/74174 - |
Information
Published : 2012-09-06 17:55
Updated : 2024-11-21 01:43
NVD link : CVE-2012-4869
Mitre link : CVE-2012-4869
CVE.ORG link : CVE-2012-4869
JSON object : View
Products Affected
sangoma
- freepbx
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')