The config restore function of Voipmonitor GUI before v24.96 does not properly check files sent as restore archives, allowing remote attackers to execute arbitrary commands via a crafted file in the web root.
References
Link | Resource |
---|---|
https://kerbit.io/research/read/blog/3 | Exploit Third Party Advisory |
https://www.voipmonitor.org/changelog-gui?major=5 | Release Notes Vendor Advisory |
https://kerbit.io/research/read/blog/3 | Exploit Third Party Advisory |
https://www.voipmonitor.org/changelog-gui?major=5 | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 06:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://kerbit.io/research/read/blog/3 - Exploit, Third Party Advisory | |
References | () https://www.voipmonitor.org/changelog-gui?major=5 - Release Notes, Vendor Advisory |
Information
Published : 2022-02-04 17:15
Updated : 2024-11-21 06:50
NVD link : CVE-2022-24262
Mitre link : CVE-2022-24262
CVE.ORG link : CVE-2022-24262
JSON object : View
Products Affected
voipmonitor
- voipmonitor
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type