XSS in app/operator_panel/index_inc.php in the Operator Panel module in FusionPBX 4.4.3 allows remote unauthenticated attackers to inject arbitrary JavaScript characters by placing a phone call using a specially crafted caller ID number. This can further lead to remote code execution by chaining this vulnerability with a command injection vulnerability also present in FusionPBX.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/153256/FusionPBX-4.4.3-Remote-Command-Execution.html | Exploit Third Party Advisory VDB Entry |
https://blog.gdssecurity.com/labs/2019/6/7/rce-using-caller-id-multiple-vulnerabilities-in-fusionpbx.html | Exploit Third Party Advisory |
https://github.com/fusionpbx/fusionpbx/commit/391a23d070f3036d0c7760992f6970b0a76ee4d7 | Patch Third Party Advisory |
http://packetstormsecurity.com/files/153256/FusionPBX-4.4.3-Remote-Command-Execution.html | Exploit Third Party Advisory VDB Entry |
https://blog.gdssecurity.com/labs/2019/6/7/rce-using-caller-id-multiple-vulnerabilities-in-fusionpbx.html | Exploit Third Party Advisory |
https://github.com/fusionpbx/fusionpbx/commit/391a23d070f3036d0c7760992f6970b0a76ee4d7 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/153256/FusionPBX-4.4.3-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://blog.gdssecurity.com/labs/2019/6/7/rce-using-caller-id-multiple-vulnerabilities-in-fusionpbx.html - Exploit, Third Party Advisory | |
References | () https://github.com/fusionpbx/fusionpbx/commit/391a23d070f3036d0c7760992f6970b0a76ee4d7 - Patch, Third Party Advisory |
Information
Published : 2019-06-17 18:15
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11408
Mitre link : CVE-2019-11408
CVE.ORG link : CVE-2019-11408
JSON object : View
Products Affected
fusionpbx
- fusionpbx
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')