A remote code execution vulnerability in Mitel MiVoice Connect Client before 214.100.1223.0 could allow an attacker to execute arbitrary code in the chat notification window, due to improper rendering of chat messages. A successful exploit could allow an attacker to steal session cookies, perform directory traversal, and execute arbitrary scripts in the context of the Connect client.
References
Link | Resource |
---|---|
https://www.mitel.com/support/security-advisories | Vendor Advisory |
https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0006 | Vendor Advisory |
https://www.mitel.com/support/security-advisories | Vendor Advisory |
https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0006 | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.mitel.com/support/security-advisories - Vendor Advisory | |
References | () https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0006 - Vendor Advisory |
Information
Published : 2020-08-26 19:15
Updated : 2024-11-21 04:59
NVD link : CVE-2020-12456
Mitre link : CVE-2020-12456
CVE.ORG link : CVE-2020-12456
JSON object : View
Products Affected
mitel
- mivoice_connect
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')