Multiple XSS vulnerabilities exist in the Backup & Restore module \ v14.0.10.2 through v14.0.10.7 for FreePBX, as shown at /admin/config.php?display=backup on the FreePBX Administrator web site. An attacker can modify the id parameter of the backup configuration screen and embed malicious XSS code via a link. When another user (such as an admin) clicks the link, the XSS payload will render and execute in the context of the victim user's account.
References
Link | Resource |
---|---|
https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities | Vendor Advisory |
https://wiki.freepbx.org/pages/viewpage.action?pageId=175177911 | Vendor Advisory |
https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities | Vendor Advisory |
https://wiki.freepbx.org/pages/viewpage.action?pageId=175177911 | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://wiki.freepbx.org/display/FOP/List+of+Securities+Vulnerabilities - Vendor Advisory | |
References | () https://wiki.freepbx.org/pages/viewpage.action?pageId=175177911 - Vendor Advisory |
Information
Published : 2020-03-16 21:15
Updated : 2024-11-21 04:35
NVD link : CVE-2019-19615
Mitre link : CVE-2019-19615
CVE.ORG link : CVE-2019-19615
JSON object : View
Products Affected
sangoma
- freepbx
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')