A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to inject PHP code using specially crafted requests to the vsethost.php page. Successful exploit could allow an attacker to execute arbitrary PHP code within the context of the application.
References
Link | Resource |
---|---|
https://github.com/twosevenzero/shoretel-mitel-rce | Product Third Party Advisory |
https://www.exploit-db.com/exploits/46174/ | Exploit Third Party Advisory VDB Entry |
https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-18-0004 | Vendor Advisory |
https://github.com/twosevenzero/shoretel-mitel-rce | Product Third Party Advisory |
https://www.exploit-db.com/exploits/46174/ | Exploit Third Party Advisory VDB Entry |
https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-18-0004 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/twosevenzero/shoretel-mitel-rce - Product, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/46174/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-18-0004 - Vendor Advisory |
Information
Published : 2018-03-14 16:29
Updated : 2024-11-21 04:09
NVD link : CVE-2018-5782
Mitre link : CVE-2018-5782
CVE.ORG link : CVE-2018-5782
JSON object : View
Products Affected
mitel
- connect_onsite
- st14.2
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')