3CX before 18 Hotfix 1 build 18.0.3.461 on Windows allows unauthenticated remote attackers to read %WINDIR%\system32 files via /Electron/download directory traversal in conjunction with a path component that has a drive letter and uses backslash characters. NOTE: this issue exists because of an incomplete fix for CVE-2022-28005.
References
Configurations
History
21 Nov 2024, 07:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://medium.com/%40frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88 - | |
References | () https://www.3cx.com/blog/change-log/phone-system-change-log/ - Release Notes |
07 Nov 2023, 03:56
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2023-05-02 05:15
Updated : 2024-11-21 07:33
NVD link : CVE-2022-48483
Mitre link : CVE-2022-48483
CVE.ORG link : CVE-2022-48483
JSON object : View
Products Affected
3cx
- 3cx
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')