Multiple SQL injection vulnerabilities in the agent interface (agc/) in VICIDIAL dialer (aka Asterisk GUI client) 2.8-403a, 2.7, 2.7RC1, and earlier allow (1) remote attackers to execute arbitrary SQL commands via the campaign variable in SCRIPT_multirecording_AJAX.php, (2) remote authenticated users to execute arbitrary SQL commands via the server_ip parameter to manager_send.php, or (3) other unspecified vectors. NOTE: some of these details are obtained from third party information.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/98903 - | |
References | () http://seclists.org/oss-sec/2013/q4/171 - Exploit | |
References | () http://seclists.org/oss-sec/2013/q4/175 - Exploit | |
References | () http://secunia.com/advisories/55453 - Vendor Advisory | |
References | () http://www.exploit-db.com/exploits/29513 - | |
References | () http://www.securityfocus.com/bid/63340 - Exploit | |
References | () https://adamcaudill.com/2013/10/23/vicidial-multiple-vulnerabilities - Exploit | |
References | () https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/vicidial_manager_send_cmd_exec.rb - Exploit |
Information
Published : 2014-03-11 19:37
Updated : 2024-11-21 01:55
NVD link : CVE-2013-4467
Mitre link : CVE-2013-4467
CVE.ORG link : CVE-2013-4467
JSON object : View
Products Affected
vicidial
- vicidial
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')