CVE-2018-5782

A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to inject PHP code using specially crafted requests to the vsethost.php page. Successful exploit could allow an attacker to execute arbitrary PHP code within the context of the application.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mitel:connect_onsite:*:*:*:*:*:*:*:*
cpe:2.3:a:mitel:st14.2:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:09

Type Values Removed Values Added
References () https://github.com/twosevenzero/shoretel-mitel-rce - Product, Third Party Advisory () https://github.com/twosevenzero/shoretel-mitel-rce - Product, Third Party Advisory
References () https://www.exploit-db.com/exploits/46174/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/46174/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-18-0004 - Vendor Advisory () https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-18-0004 - Vendor Advisory

Information

Published : 2018-03-14 16:29

Updated : 2024-11-21 04:09


NVD link : CVE-2018-5782

Mitre link : CVE-2018-5782

CVE.ORG link : CVE-2018-5782


JSON object : View

Products Affected

mitel

  • connect_onsite
  • st14.2
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')