#VU43620 Code Injection in FreePBX - CVE-2012-4869
Published: September 6, 2012 / Updated: September 1, 2021
Vulnerability identifier: #VU43620
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:A/U:Green
CVE-ID: CVE-2012-4869
CWE-ID: CWE-94
Exploitation vector: Remote access
Exploit availability:
Public exploit is available
Vulnerable software:
FreePBX
FreePBX
Software vendor:
FreePBX
FreePBX
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The callme_startcall function in recordings/misc/callme_page.php in FreePBX 2.9, 2.10, and earlier allows remote attackers to execute arbitrary commands via the callmenum parameter in a c action.
Remediation
Install update from vendor's website.
External links
- http://packetstormsecurity.org/files/111028/FreePBX-2.10.0-Remote-Command-Execution-XSS.html
- http://seclists.org/fulldisclosure/2012/Mar/234
- http://secunia.com/advisories/48463
- http://www.exploit-db.com/exploits/18649
- http://www.exploit-db.com/exploits/18659
- http://www.freepbx.org/trac/ticket/5711
- http://www.securityfocus.com/bid/52630
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74174