An OS Command Injection vulnerability in the endpoint_devicemap.php component of Fonality Trixbox Community Edition allows an attacker to execute commands on the underlying operating system as the "asterisk" user. Note that Trixbox Community Edition has been unsupported by the vendor since 2012. This issue affects: Fonality Trixbox Community Edition, versions 1.2.0 through 2.8.0.4. Versions 1.0 and 1.1 are unaffected.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/157565/TrixBox-CE-2.8.0.4-Command-Execution.html | Exploit Third Party Advisory |
https://github.com/rapid7/metasploit-framework/pull/13353 | Exploit Issue Tracking Patch Third Party Advisory |
http://packetstormsecurity.com/files/157565/TrixBox-CE-2.8.0.4-Command-Execution.html | Exploit Third Party Advisory |
https://github.com/rapid7/metasploit-framework/pull/13353 | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 7.3 |
References | () http://packetstormsecurity.com/files/157565/TrixBox-CE-2.8.0.4-Command-Execution.html - Exploit, Third Party Advisory | |
References | () https://github.com/rapid7/metasploit-framework/pull/13353 - Exploit, Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2020-05-01 16:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7351
Mitre link : CVE-2020-7351
CVE.ORG link : CVE-2020-7351
JSON object : View
Products Affected
netfortris
- trixbox
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')