trixbox 2.8.0.4 has OS command injection via shell metacharacters in the lang parameter to /maint/modules/home/index.php.
References
Configurations
History
21 Nov 2024, 03:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/162854/Trixbox-2.8.0.4-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/103004 - Third Party Advisory, VDB Entry | |
References | () https://github.com/Hacker5preme/Exploits/tree/main/CVE-2017-14535-Exploit - Exploit, Third Party Advisory | |
References | () https://secur1tyadvisory.wordpress.com/2018/02/11/trixbox-os-command-injection-vulnerability-cve-2017-14535/ - Exploit, Third Party Advisory | |
References | () https://twitter.com/tiger_tigerboy/status/962689803270500352 - Third Party Advisory | |
References | () https://www.linkedin.com/pulse/trixbox-os-command-injection-vulnerability-sachin-wagh-ceh-ecsa-/?published=t - Exploit, Third Party Advisory |
Information
Published : 2018-02-16 04:29
Updated : 2024-11-21 03:13
NVD link : CVE-2017-14535
Mitre link : CVE-2017-14535
CVE.ORG link : CVE-2017-14535
JSON object : View
Products Affected
netfortris
- trixbox
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')