CVE-2020-7351

An OS Command Injection vulnerability in the endpoint_devicemap.php component of Fonality Trixbox Community Edition allows an attacker to execute commands on the underlying operating system as the "asterisk" user. Note that Trixbox Community Edition has been unsupported by the vendor since 2012. This issue affects: Fonality Trixbox Community Edition, versions 1.2.0 through 2.8.0.4. Versions 1.0 and 1.1 are unaffected.
Configurations

Configuration 1 (hide)

cpe:2.3:a:netfortris:trixbox:*:*:*:*:community:*:*:*

History

21 Nov 2024, 05:37

Type Values Removed Values Added
CVSS v2 : 9.0
v3 : 8.8
v2 : 9.0
v3 : 7.3
References () http://packetstormsecurity.com/files/157565/TrixBox-CE-2.8.0.4-Command-Execution.html - Exploit, Third Party Advisory () http://packetstormsecurity.com/files/157565/TrixBox-CE-2.8.0.4-Command-Execution.html - Exploit, Third Party Advisory
References () https://github.com/rapid7/metasploit-framework/pull/13353 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://github.com/rapid7/metasploit-framework/pull/13353 - Exploit, Issue Tracking, Patch, Third Party Advisory

Information

Published : 2020-05-01 16:15

Updated : 2024-11-21 05:37


NVD link : CVE-2020-7351

Mitre link : CVE-2020-7351

CVE.ORG link : CVE-2020-7351


JSON object : View

Products Affected

netfortris

  • trixbox
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')