Vulnerabilites related to freepbx - freepbx
cve-2009-1803
Vulnerability from cvelistv5
Published
2009-05-28 14:00
Modified
2024-09-16 22:51
Severity ?
EPSS score ?
Summary
FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, generates different error messages for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
References
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/54263 | vdb-entry, x_refsource_OSVDB | |
http://freepbx.org/trac/ticket/3660 | x_refsource_CONFIRM | |
http://secunia.com/advisories/34772 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/34857 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T05:27:54.399Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "54263", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://www.osvdb.org/54263", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://freepbx.org/trac/ticket/3660", }, { name: "34772", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/34772", }, { name: "34857", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/34857", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, generates different error messages for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2009-05-28T14:00:00Z", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "54263", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://www.osvdb.org/54263", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://freepbx.org/trac/ticket/3660", }, { name: "34772", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/34772", }, { name: "34857", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/34857", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2009-1803", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, generates different error messages for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "54263", refsource: "OSVDB", url: "http://www.osvdb.org/54263", }, { name: "http://freepbx.org/trac/ticket/3660", refsource: "CONFIRM", url: "http://freepbx.org/trac/ticket/3660", }, { name: "34772", refsource: "SECUNIA", url: "http://secunia.com/advisories/34772", }, { name: "34857", refsource: "BID", url: "http://www.securityfocus.com/bid/34857", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2009-1803", datePublished: "2009-05-28T14:00:00Z", dateReserved: "2009-05-28T00:00:00Z", dateUpdated: "2024-09-16T22:51:26.975Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2009-1802
Vulnerability from cvelistv5
Published
2009-05-28 14:00
Modified
2024-09-17 00:26
Severity ?
EPSS score ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, allow remote attackers to hijack the authentication of admins for requests that create a new admin account or have unspecified other impact.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/54262 | vdb-entry, x_refsource_OSVDB | |
http://freepbx.org/trac/ticket/3660 | x_refsource_CONFIRM | |
http://secunia.com/advisories/34772 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/34857 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T05:27:54.653Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "54262", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/54262", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://freepbx.org/trac/ticket/3660", }, { name: "34772", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/34772", }, { name: "34857", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/34857", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple cross-site request forgery (CSRF) vulnerabilities in FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, allow remote attackers to hijack the authentication of admins for requests that create a new admin account or have unspecified other impact.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2009-05-28T14:00:00Z", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "54262", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/54262", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://freepbx.org/trac/ticket/3660", }, { name: "34772", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/34772", }, { name: "34857", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/34857", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2009-1802", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple cross-site request forgery (CSRF) vulnerabilities in FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, allow remote attackers to hijack the authentication of admins for requests that create a new admin account or have unspecified other impact.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "54262", refsource: "OSVDB", url: "http://osvdb.org/54262", }, { name: "http://freepbx.org/trac/ticket/3660", refsource: "CONFIRM", url: "http://freepbx.org/trac/ticket/3660", }, { name: "34772", refsource: "SECUNIA", url: "http://secunia.com/advisories/34772", }, { name: "34857", refsource: "BID", url: "http://www.securityfocus.com/bid/34857", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2009-1802", datePublished: "2009-05-28T14:00:00Z", dateReserved: "2009-05-28T00:00:00Z", dateUpdated: "2024-09-17T00:26:13.030Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-7235
Vulnerability from cvelistv5
Published
2014-10-07 14:00
Modified
2024-08-06 12:40
Severity ?
EPSS score ?
Summary
htdocs_ari/includes/login.php in the ARI Framework module/Asterisk Recording Interface (ARI) in FreePBX before 2.9.0.9, 2.10.x, and 2.11 before 2.11.1.5 allows remote attackers to execute arbitrary code via the ari_auth cookie, related to the PHP unserialize function, as exploited in the wild in September 2014.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/128516/FreePBX-Authentication-Bypass-Account-Creation.html | x_refsource_MISC | |
http://secunia.com/advisories/61601 | third-party-advisory, x_refsource_SECUNIA | |
https://github.com/FreePBX/fw_ari/commit/f294b4580ce725ca3c5e692d86e63d40cef4d836 | x_refsource_CONFIRM | |
http://community.freepbx.org/t/critical-freepbx-rce-vulnerability-all-versions-cve-2014-7235/24536 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/96790 | vdb-entry, x_refsource_XF | |
https://www.exploit-db.com/exploits/41005/ | exploit, x_refsource_EXPLOIT-DB | |
http://www.securityfocus.com/bid/70188 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T12:40:19.297Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/128516/FreePBX-Authentication-Bypass-Account-Creation.html", }, { name: "61601", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61601", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/FreePBX/fw_ari/commit/f294b4580ce725ca3c5e692d86e63d40cef4d836", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://community.freepbx.org/t/critical-freepbx-rce-vulnerability-all-versions-cve-2014-7235/24536", }, { name: "freepbx-ariframework-code-exec(96790)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/96790", }, { name: "41005", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/41005/", }, { name: "70188", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/70188", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-09-30T00:00:00", descriptions: [ { lang: "en", value: "htdocs_ari/includes/login.php in the ARI Framework module/Asterisk Recording Interface (ARI) in FreePBX before 2.9.0.9, 2.10.x, and 2.11 before 2.11.1.5 allows remote attackers to execute arbitrary code via the ari_auth cookie, related to the PHP unserialize function, as exploited in the wild in September 2014.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-07T15:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/128516/FreePBX-Authentication-Bypass-Account-Creation.html", }, { name: "61601", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61601", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/FreePBX/fw_ari/commit/f294b4580ce725ca3c5e692d86e63d40cef4d836", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://community.freepbx.org/t/critical-freepbx-rce-vulnerability-all-versions-cve-2014-7235/24536", }, { name: "freepbx-ariframework-code-exec(96790)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/96790", }, { name: "41005", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/41005/", }, { name: "70188", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/70188", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-7235", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "htdocs_ari/includes/login.php in the ARI Framework module/Asterisk Recording Interface (ARI) in FreePBX before 2.9.0.9, 2.10.x, and 2.11 before 2.11.1.5 allows remote attackers to execute arbitrary code via the ari_auth cookie, related to the PHP unserialize function, as exploited in the wild in September 2014.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://packetstormsecurity.com/files/128516/FreePBX-Authentication-Bypass-Account-Creation.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/128516/FreePBX-Authentication-Bypass-Account-Creation.html", }, { name: "61601", refsource: "SECUNIA", url: "http://secunia.com/advisories/61601", }, { name: "https://github.com/FreePBX/fw_ari/commit/f294b4580ce725ca3c5e692d86e63d40cef4d836", refsource: "CONFIRM", url: "https://github.com/FreePBX/fw_ari/commit/f294b4580ce725ca3c5e692d86e63d40cef4d836", }, { name: "http://community.freepbx.org/t/critical-freepbx-rce-vulnerability-all-versions-cve-2014-7235/24536", refsource: "CONFIRM", url: "http://community.freepbx.org/t/critical-freepbx-rce-vulnerability-all-versions-cve-2014-7235/24536", }, { name: "freepbx-ariframework-code-exec(96790)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/96790", }, { name: "41005", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/41005/", }, { name: "70188", refsource: "BID", url: "http://www.securityfocus.com/bid/70188", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-7235", datePublished: "2014-10-07T14:00:00", dateReserved: "2014-09-30T00:00:00", dateUpdated: "2024-08-06T12:40:19.297Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-1903
Vulnerability from cvelistv5
Published
2014-02-18 11:00
Modified
2024-08-06 09:58
Severity ?
EPSS score ?
Summary
admin/libraries/view.functions.php in FreePBX 2.9 before 2.9.0.14, 2.10 before 2.10.1.15, 2.11 before 2.11.0.23, and 12 before 12.0.1alpha22 does not restrict the set of functions accessible to the API handler, which allows remote attackers to execute arbitrary PHP code via the function and args parameters to admin/config.php.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T09:58:14.499Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/0x00string/oldays/blob/master/CVE-2014-1903.pl", }, { name: "103240", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/103240", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://code.freepbx.org/changelog/FreePBX_Framework?cs=a29382efeb293ef4f42aa9b841dfc8eabb2d1e03", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://code.freepbx.org/changelog/FreePBX_SVN?cs=16429", }, { name: "20140211 Re: Freepbx , php code execution exploit", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0111.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/125215/FreePBX-2.9-Remote-Code-Execution.html", }, { name: "20140211 Freepbx , php code execution exploit", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0097.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://issues.freepbx.org/browse/FREEPBX-7123", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.freepbx.org/news/2014-02-06/security-vulnerability-notice", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://issues.freepbx.org/browse/FREEPBX-7117", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/125166/FreePBX-2.x-Code-Execution.html", }, { name: "20140211 [CVE-2014-1903] FreePBX 2.9 through 12 RCE", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/531040/100/0/threaded", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-02-11T00:00:00", descriptions: [ { lang: "en", value: "admin/libraries/view.functions.php in FreePBX 2.9 before 2.9.0.14, 2.10 before 2.10.1.15, 2.11 before 2.11.0.23, and 12 before 12.0.1alpha22 does not restrict the set of functions accessible to the API handler, which allows remote attackers to execute arbitrary PHP code via the function and args parameters to admin/config.php.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-09T18:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/0x00string/oldays/blob/master/CVE-2014-1903.pl", }, { name: "103240", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/103240", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://code.freepbx.org/changelog/FreePBX_Framework?cs=a29382efeb293ef4f42aa9b841dfc8eabb2d1e03", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://code.freepbx.org/changelog/FreePBX_SVN?cs=16429", }, { name: "20140211 Re: Freepbx , php code execution exploit", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0111.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/125215/FreePBX-2.9-Remote-Code-Execution.html", }, { name: "20140211 Freepbx , php code execution exploit", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0097.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://issues.freepbx.org/browse/FREEPBX-7123", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.freepbx.org/news/2014-02-06/security-vulnerability-notice", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://issues.freepbx.org/browse/FREEPBX-7117", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/125166/FreePBX-2.x-Code-Execution.html", }, { name: "20140211 [CVE-2014-1903] FreePBX 2.9 through 12 RCE", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/531040/100/0/threaded", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-1903", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "admin/libraries/view.functions.php in FreePBX 2.9 before 2.9.0.14, 2.10 before 2.10.1.15, 2.11 before 2.11.0.23, and 12 before 12.0.1alpha22 does not restrict the set of functions accessible to the API handler, which allows remote attackers to execute arbitrary PHP code via the function and args parameters to admin/config.php.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/0x00string/oldays/blob/master/CVE-2014-1903.pl", refsource: "MISC", url: "https://github.com/0x00string/oldays/blob/master/CVE-2014-1903.pl", }, { name: "103240", refsource: "OSVDB", url: "http://osvdb.org/103240", }, { name: "http://code.freepbx.org/changelog/FreePBX_Framework?cs=a29382efeb293ef4f42aa9b841dfc8eabb2d1e03", refsource: "CONFIRM", url: "http://code.freepbx.org/changelog/FreePBX_Framework?cs=a29382efeb293ef4f42aa9b841dfc8eabb2d1e03", }, { name: "http://code.freepbx.org/changelog/FreePBX_SVN?cs=16429", refsource: "CONFIRM", url: "http://code.freepbx.org/changelog/FreePBX_SVN?cs=16429", }, { name: "20140211 Re: Freepbx , php code execution exploit", refsource: "FULLDISC", url: "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0111.html", }, { name: "http://packetstormsecurity.com/files/125215/FreePBX-2.9-Remote-Code-Execution.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/125215/FreePBX-2.9-Remote-Code-Execution.html", }, { name: "20140211 Freepbx , php code execution exploit", refsource: "FULLDISC", url: "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0097.html", }, { name: "http://issues.freepbx.org/browse/FREEPBX-7123", refsource: "CONFIRM", url: "http://issues.freepbx.org/browse/FREEPBX-7123", }, { name: "http://www.freepbx.org/news/2014-02-06/security-vulnerability-notice", refsource: "CONFIRM", url: "http://www.freepbx.org/news/2014-02-06/security-vulnerability-notice", }, { name: "http://issues.freepbx.org/browse/FREEPBX-7117", refsource: "CONFIRM", url: "http://issues.freepbx.org/browse/FREEPBX-7117", }, { name: "http://packetstormsecurity.com/files/125166/FreePBX-2.x-Code-Execution.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/125166/FreePBX-2.x-Code-Execution.html", }, { name: "20140211 [CVE-2014-1903] FreePBX 2.9 through 12 RCE", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/531040/100/0/threaded", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-1903", datePublished: "2014-02-18T11:00:00", dateReserved: "2014-02-07T00:00:00", dateUpdated: "2024-08-06T09:58:14.499Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-15891
Vulnerability from cvelistv5
Published
2019-06-20 16:35
Modified
2024-08-05 10:10
Severity ?
EPSS score ?
Summary
An issue was discovered in FreePBX core before 3.0.122.43, 14.0.18.34, and 5.0.1beta4. By crafting a request for adding Asterisk modules, an attacker is able to store JavaScript commands in a module name.
References
▼ | URL | Tags |
---|---|---|
https://www.freepbx.org/ | x_refsource_MISC | |
https://wiki.freepbx.org/display/FOP/2018-09-11+Core+Stored+XSS?src=contextnavpagetreemode | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T10:10:06.008Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.freepbx.org/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://wiki.freepbx.org/display/FOP/2018-09-11+Core+Stored+XSS?src=contextnavpagetreemode", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "An issue was discovered in FreePBX core before 3.0.122.43, 14.0.18.34, and 5.0.1beta4. By crafting a request for adding Asterisk modules, an attacker is able to store JavaScript commands in a module name.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-06-20T16:35:57", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.freepbx.org/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://wiki.freepbx.org/display/FOP/2018-09-11+Core+Stored+XSS?src=contextnavpagetreemode", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-15891", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in FreePBX core before 3.0.122.43, 14.0.18.34, and 5.0.1beta4. By crafting a request for adding Asterisk modules, an attacker is able to store JavaScript commands in a module name.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://www.freepbx.org/", refsource: "MISC", url: "https://www.freepbx.org/", }, { name: "https://wiki.freepbx.org/display/FOP/2018-09-11+Core+Stored+XSS?src=contextnavpagetreemode", refsource: "CONFIRM", url: "https://wiki.freepbx.org/display/FOP/2018-09-11+Core+Stored+XSS?src=contextnavpagetreemode", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-15891", datePublished: "2019-06-20T16:35:57", dateReserved: "2018-08-26T00:00:00", dateUpdated: "2024-08-05T10:10:06.008Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2007-2350
Vulnerability from cvelistv5
Published
2007-04-30 22:00
Modified
2024-08-07 13:33
Severity ?
EPSS score ?
Summary
admin/config.php in the music-on-hold module in freePBX 2.2.x allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the del parameter.
References
▼ | URL | Tags |
---|---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053915.html | mailing-list, x_refsource_FULLDISC | |
http://osvdb.org/35316 | vdb-entry, x_refsource_OSVDB | |
http://securityreason.com/securityalert/2652 | third-party-advisory, x_refsource_SREASON | |
http://secunia.com/advisories/24935 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2007/1535 | vdb-entry, x_refsource_VUPEN |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T13:33:28.621Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20070421 freePBX 2.2.x's Music-on-hold Remote Code Execution Injection", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053915.html", }, { name: "35316", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/35316", }, { name: "2652", tags: [ "third-party-advisory", "x_refsource_SREASON", "x_transferred", ], url: "http://securityreason.com/securityalert/2652", }, { name: "24935", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24935", }, { name: "ADV-2007-1535", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2007/1535", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2007-04-21T00:00:00", descriptions: [ { lang: "en", value: "admin/config.php in the music-on-hold module in freePBX 2.2.x allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the del parameter.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2007-08-22T09:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20070421 freePBX 2.2.x's Music-on-hold Remote Code Execution Injection", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053915.html", }, { name: "35316", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/35316", }, { name: "2652", tags: [ "third-party-advisory", "x_refsource_SREASON", ], url: "http://securityreason.com/securityalert/2652", }, { name: "24935", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24935", }, { name: "ADV-2007-1535", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2007/1535", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2007-2350", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "admin/config.php in the music-on-hold module in freePBX 2.2.x allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the del parameter.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20070421 freePBX 2.2.x's Music-on-hold Remote Code Execution Injection", refsource: "FULLDISC", url: "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053915.html", }, { name: "35316", refsource: "OSVDB", url: "http://osvdb.org/35316", }, { name: "2652", refsource: "SREASON", url: "http://securityreason.com/securityalert/2652", }, { name: "24935", refsource: "SECUNIA", url: "http://secunia.com/advisories/24935", }, { name: "ADV-2007-1535", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2007/1535", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2007-2350", datePublished: "2007-04-30T22:00:00", dateReserved: "2007-04-30T00:00:00", dateUpdated: "2024-08-07T13:33:28.621Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2007-2191
Vulnerability from cvelistv5
Published
2007-04-24 17:00
Modified
2024-08-07 13:23
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in freePBX 2.2.x allow remote attackers to inject arbitrary web script or HTML via the (1) From, (2) To, (3) Call-ID, (4) User-Agent, and unspecified other SIP protocol fields, which are stored in /var/log/asterisk/full and displayed by admin/modules/logfiles/asterisk-full-log.php.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/33772 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/23575 | vdb-entry, x_refsource_BID | |
http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053882.html | mailing-list, x_refsource_FULLDISC | |
http://securityreason.com/securityalert/2627 | third-party-advisory, x_refsource_SREASON | |
http://osvdb.org/35315 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/24935 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2007/1535 | vdb-entry, x_refsource_VUPEN |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T13:23:51.024Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "freepbx-sip-xss(33772)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33772", }, { name: "23575", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/23575", }, { name: "20070419 XSS in freePBX 2.2.x portal's Asterisk Log tool", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053882.html", }, { name: "2627", tags: [ "third-party-advisory", "x_refsource_SREASON", "x_transferred", ], url: "http://securityreason.com/securityalert/2627", }, { name: "35315", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/35315", }, { name: "24935", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24935", }, { name: "ADV-2007-1535", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2007/1535", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2007-04-19T00:00:00", descriptions: [ { lang: "en", value: "Multiple cross-site scripting (XSS) vulnerabilities in freePBX 2.2.x allow remote attackers to inject arbitrary web script or HTML via the (1) From, (2) To, (3) Call-ID, (4) User-Agent, and unspecified other SIP protocol fields, which are stored in /var/log/asterisk/full and displayed by admin/modules/logfiles/asterisk-full-log.php.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-28T12:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "freepbx-sip-xss(33772)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33772", }, { name: "23575", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/23575", }, { name: "20070419 XSS in freePBX 2.2.x portal's Asterisk Log tool", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053882.html", }, { name: "2627", tags: [ "third-party-advisory", "x_refsource_SREASON", ], url: "http://securityreason.com/securityalert/2627", }, { name: "35315", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/35315", }, { name: "24935", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24935", }, { name: "ADV-2007-1535", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2007/1535", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2007-2191", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple cross-site scripting (XSS) vulnerabilities in freePBX 2.2.x allow remote attackers to inject arbitrary web script or HTML via the (1) From, (2) To, (3) Call-ID, (4) User-Agent, and unspecified other SIP protocol fields, which are stored in /var/log/asterisk/full and displayed by admin/modules/logfiles/asterisk-full-log.php.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "freepbx-sip-xss(33772)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33772", }, { name: "23575", refsource: "BID", url: "http://www.securityfocus.com/bid/23575", }, { name: "20070419 XSS in freePBX 2.2.x portal's Asterisk Log tool", refsource: "FULLDISC", url: "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053882.html", }, { name: "2627", refsource: "SREASON", url: "http://securityreason.com/securityalert/2627", }, { name: "35315", refsource: "OSVDB", url: "http://osvdb.org/35315", }, { name: "24935", refsource: "SECUNIA", url: "http://secunia.com/advisories/24935", }, { name: "ADV-2007-1535", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2007/1535", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2007-2191", datePublished: "2007-04-24T17:00:00", dateReserved: "2007-04-24T00:00:00", dateUpdated: "2024-08-07T13:23:51.024Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2009-4458
Vulnerability from cvelistv5
Published
2009-12-30 00:00
Modified
2024-08-07 07:01
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.5.2 and 2.6.0rc2, and possibly other versions, allow remote attackers to inject arbitrary web script or HTML via the (1) tech parameter to admin/admin/config.php during a trunks display action, the (2) description parameter during an Add Zap Channel action, and (3) unspecified vectors during an Add Recordings action.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/61357 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/55054 | vdb-entry, x_refsource_XF | |
http://www.exploit-db.com/exploits/10645 | exploit, x_refsource_EXPLOIT-DB | |
http://secunia.com/advisories/37972 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/55053 | vdb-entry, x_refsource_XF | |
http://osvdb.org/61358 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/37482 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T07:01:20.388Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "61357", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/61357", }, { name: "freepbx-zap-xss(55054)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/55054", }, { name: "10645", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "http://www.exploit-db.com/exploits/10645", }, { name: "37972", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/37972", }, { name: "freepbx-tech-xss(55053)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/55053", }, { name: "61358", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/61358", }, { name: "37482", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/37482", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2009-12-24T00:00:00", descriptions: [ { lang: "en", value: "Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.5.2 and 2.6.0rc2, and possibly other versions, allow remote attackers to inject arbitrary web script or HTML via the (1) tech parameter to admin/admin/config.php during a trunks display action, the (2) description parameter during an Add Zap Channel action, and (3) unspecified vectors during an Add Recordings action.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-16T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "61357", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/61357", }, { name: "freepbx-zap-xss(55054)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/55054", }, { name: "10645", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "http://www.exploit-db.com/exploits/10645", }, { name: "37972", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/37972", }, { name: "freepbx-tech-xss(55053)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/55053", }, { name: "61358", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/61358", }, { name: "37482", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/37482", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2009-4458", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.5.2 and 2.6.0rc2, and possibly other versions, allow remote attackers to inject arbitrary web script or HTML via the (1) tech parameter to admin/admin/config.php during a trunks display action, the (2) description parameter during an Add Zap Channel action, and (3) unspecified vectors during an Add Recordings action.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "61357", refsource: "OSVDB", url: "http://osvdb.org/61357", }, { name: "freepbx-zap-xss(55054)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/55054", }, { name: "10645", refsource: "EXPLOIT-DB", url: "http://www.exploit-db.com/exploits/10645", }, { name: "37972", refsource: "SECUNIA", url: "http://secunia.com/advisories/37972", }, { name: "freepbx-tech-xss(55053)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/55053", }, { name: "61358", refsource: "OSVDB", url: "http://osvdb.org/61358", }, { name: "37482", refsource: "BID", url: "http://www.securityfocus.com/bid/37482", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2009-4458", datePublished: "2009-12-30T00:00:00", dateReserved: "2009-12-29T00:00:00", dateUpdated: "2024-08-07T07:01:20.388Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2009-1801
Vulnerability from cvelistv5
Published
2009-05-28 14:00
Modified
2024-08-07 05:27
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, allow remote attackers to inject arbitrary web script or HTML via the (1) display parameter to reports.php, the (2) order and (3) extdisplay parameters to config.php, and the (4) sort parameter to recordings/index.php. NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/50361 | vdb-entry, x_refsource_XF | |
http://osvdb.org/54260 | vdb-entry, x_refsource_OSVDB | |
http://osvdb.org/54261 | vdb-entry, x_refsource_OSVDB | |
http://freepbx.org/trac/ticket/3660 | x_refsource_CONFIRM | |
http://secunia.com/advisories/34772 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/34857 | vdb-entry, x_refsource_BID | |
http://osvdb.org/54259 | vdb-entry, x_refsource_OSVDB |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T05:27:54.569Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "freepbx-reports-xss(50361)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/50361", }, { name: "54260", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/54260", }, { name: "54261", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/54261", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://freepbx.org/trac/ticket/3660", }, { name: "34772", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/34772", }, { name: "34857", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/34857", }, { name: "54259", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/54259", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2009-05-06T00:00:00", descriptions: [ { lang: "en", value: "Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, allow remote attackers to inject arbitrary web script or HTML via the (1) display parameter to reports.php, the (2) order and (3) extdisplay parameters to config.php, and the (4) sort parameter to recordings/index.php. NOTE: some of these details are obtained from third party information.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-16T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "freepbx-reports-xss(50361)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/50361", }, { name: "54260", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/54260", }, { name: "54261", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/54261", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://freepbx.org/trac/ticket/3660", }, { name: "34772", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/34772", }, { name: "34857", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/34857", }, { name: "54259", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/54259", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2009-1801", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, allow remote attackers to inject arbitrary web script or HTML via the (1) display parameter to reports.php, the (2) order and (3) extdisplay parameters to config.php, and the (4) sort parameter to recordings/index.php. NOTE: some of these details are obtained from third party information.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "freepbx-reports-xss(50361)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/50361", }, { name: "54260", refsource: "OSVDB", url: "http://osvdb.org/54260", }, { name: "54261", refsource: "OSVDB", url: "http://osvdb.org/54261", }, { name: "http://freepbx.org/trac/ticket/3660", refsource: "CONFIRM", url: "http://freepbx.org/trac/ticket/3660", }, { name: "34772", refsource: "SECUNIA", url: "http://secunia.com/advisories/34772", }, { name: "34857", refsource: "BID", url: "http://www.securityfocus.com/bid/34857", }, { name: "54259", refsource: "OSVDB", url: "http://osvdb.org/54259", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2009-1801", datePublished: "2009-05-28T14:00:00", dateReserved: "2009-05-28T00:00:00", dateUpdated: "2024-08-07T05:27:54.569Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2009-05-28 14:30
Modified
2024-11-21 01:03
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, allow remote attackers to inject arbitrary web script or HTML via the (1) display parameter to reports.php, the (2) order and (3) extdisplay parameters to config.php, and the (4) sort parameter to recordings/index.php. NOTE: some of these details are obtained from third party information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:freepbx:freepbx:2.4:*:*:*:*:*:*:*", matchCriteriaId: "455E97D6-B069-49D6-B510-3D4112A9E1B3", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.4.0_beta1:*:*:*:*:*:*:*", matchCriteriaId: "BF1E1278-3114-4BD1-B589-30B5313C9502", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.4.0_beta2:*:*:*:*:*:*:*", matchCriteriaId: "32D216B0-31D6-4288-8773-FB2438944492", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "0A09E3F0-E1A6-4CC4-8134-89DF5DB6EA3B", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5.0_beta1:*:*:*:*:*:*:*", matchCriteriaId: "11ACC1C9-A2C3-41CA-B608-C474B642A380", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5.0rc2:*:*:*:*:*:*:*", matchCriteriaId: "D8A021AB-A142-4DAD-9EB0-2352C625D8CC", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5.0rc3:*:*:*:*:*:*:*", matchCriteriaId: "9C0B173F-2161-4E40-A712-90DA6B997820", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "613A39A4-976E-4535-9408-533F957F7F87", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B5B657C6-A2DF-432A-9F46-1157C630CB20", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:2.4.0:*:*:*:*:*:*:*", matchCriteriaId: "9734B50E-BEA8-41DF-835F-7B15A9BB31E8", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:2.5.0:*:*:*:*:*:*:*", matchCriteriaId: "E9645D4F-BB03-49AD-AE79-6FE990BF18FE", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, allow remote attackers to inject arbitrary web script or HTML via the (1) display parameter to reports.php, the (2) order and (3) extdisplay parameters to config.php, and the (4) sort parameter to recordings/index.php. NOTE: some of these details are obtained from third party information.", }, { lang: "es", value: "Múltiples vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados(XSS) en FreePBX v2.5.1, y otras v2.4.x, v2.5.x, y versiones pre-release v2.6.x, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través (1) del parámetro display a reports.php, (2) el order y (3) el parámetro extdisplay a config.php, y (4) el parámetro sort a recordings/index.php. NOTA: algunos de estos detalles han sido obtenidos a partir de terceros.", }, ], id: "CVE-2009-1801", lastModified: "2024-11-21T01:03:24.723", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2009-05-28T14:30:00.343", references: [ { source: "cve@mitre.org", url: "http://freepbx.org/trac/ticket/3660", }, { source: "cve@mitre.org", url: "http://osvdb.org/54259", }, { source: "cve@mitre.org", url: "http://osvdb.org/54260", }, { source: "cve@mitre.org", url: "http://osvdb.org/54261", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/34772", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/34857", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/50361", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://freepbx.org/trac/ticket/3660", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/54259", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/54260", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/54261", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/34772", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/34857", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/50361", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2009-12-30 00:30
Modified
2024-11-21 01:09
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.5.2 and 2.6.0rc2, and possibly other versions, allow remote attackers to inject arbitrary web script or HTML via the (1) tech parameter to admin/admin/config.php during a trunks display action, the (2) description parameter during an Add Zap Channel action, and (3) unspecified vectors during an Add Recordings action.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:freepbx:freepbx:2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B5B657C6-A2DF-432A-9F46-1157C630CB20", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.6.0:rc2:*:*:*:*:*:*", matchCriteriaId: "E2E4487C-8475-46C0-B469-430B49F4C0D0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.5.2 and 2.6.0rc2, and possibly other versions, allow remote attackers to inject arbitrary web script or HTML via the (1) tech parameter to admin/admin/config.php during a trunks display action, the (2) description parameter during an Add Zap Channel action, and (3) unspecified vectors during an Add Recordings action.", }, { lang: "es", value: "Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en FreePBX v2.5.2 y v2.6.0rc2, y probablemente otras versiones, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante (1) el parámetro \"tech\" en admin/admin/config.php durante una acción trunks display, (2) el parámetro \"description\" durante una acción Add Zap Channel, y (3) vectores no especificados durante una acción Add Recordings.", }, ], id: "CVE-2009-4458", lastModified: "2024-11-21T01:09:41.650", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2009-12-30T00:30:00.467", references: [ { source: "cve@mitre.org", url: "http://osvdb.org/61357", }, { source: "cve@mitre.org", url: "http://osvdb.org/61358", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/37972", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://www.exploit-db.com/exploits/10645", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://www.securityfocus.com/bid/37482", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/55053", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/55054", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/61357", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/61358", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/37972", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://www.exploit-db.com/exploits/10645", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://www.securityfocus.com/bid/37482", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/55053", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/55054", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-06-20 17:15
Modified
2024-11-21 03:51
Severity ?
Summary
An issue was discovered in FreePBX core before 3.0.122.43, 14.0.18.34, and 5.0.1beta4. By crafting a request for adding Asterisk modules, an attacker is able to store JavaScript commands in a module name.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:freepbx:freepbx:15.0.1:-:*:*:*:*:*:*", matchCriteriaId: "31CDB8E8-DDC5-4FD0-B92F-0CE8B546728D", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:*:*:*:*:*:*:*:*", matchCriteriaId: "6B5E032A-03FF-4A60-954C-87D87041C8A4", versionEndExcluding: "13.0.122.43", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:*:*:*:*:*:*:*:*", matchCriteriaId: "E09C7941-32F4-4FE8-8CC7-2A5C1B79B562", versionEndExcluding: "14.0.18.34", versionStartIncluding: "14.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:*:*:*:*:*:*:*:*", matchCriteriaId: "0CC65822-E00B-46C8-A7EF-C226C5B14FAE", versionEndIncluding: "15.0.1", versionStartIncluding: "15.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:15.0.1:beta4:*:*:*:*:*:*", matchCriteriaId: "7A84BC1D-AB54-4019-B2CF-C0928AD318FD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in FreePBX core before 3.0.122.43, 14.0.18.34, and 5.0.1beta4. By crafting a request for adding Asterisk modules, an attacker is able to store JavaScript commands in a module name.", }, { lang: "es", value: "Se detecto un problema en el núcleo de FreePBX antes de la versión 3.0.122.43, 14.0.18.34 y 5.0.1beta4. Al crear una solicitud para agregar módulos de Asterisk, un atacante puede almacenar comandos de JavaScript en el nombre de un módulo.", }, ], id: "CVE-2018-15891", lastModified: "2024-11-21T03:51:39.537", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 1.7, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-06-20T17:15:09.847", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://wiki.freepbx.org/display/FOP/2018-09-11+Core+Stored+XSS?src=contextnavpagetreemode", }, { source: "cve@mitre.org", tags: [ "Product", ], url: "https://www.freepbx.org/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://wiki.freepbx.org/display/FOP/2018-09-11+Core+Stored+XSS?src=contextnavpagetreemode", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Product", ], url: "https://www.freepbx.org/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2009-05-28 14:30
Modified
2024-11-21 01:03
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, allow remote attackers to hijack the authentication of admins for requests that create a new admin account or have unspecified other impact.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
freepbx | freepbx | 2.4 | |
freepbx | freepbx | 2.4.0_beta1 | |
freepbx | freepbx | 2.4.0_beta2 | |
freepbx | freepbx | 2.4.1 | |
freepbx | freepbx | 2.5 | |
freepbx | freepbx | 2.5.0_beta1 | |
freepbx | freepbx | 2.5.0rc2 | |
freepbx | freepbx | 2.5.0rc3 | |
freepbx | freepbx | 2.5.1 | |
freepbx | freepbx | 2.5.2 | |
sangoma | freepbx | 2.4.0 | |
sangoma | freepbx | 2.5.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:freepbx:freepbx:2.4:*:*:*:*:*:*:*", matchCriteriaId: "455E97D6-B069-49D6-B510-3D4112A9E1B3", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.4.0_beta1:*:*:*:*:*:*:*", matchCriteriaId: "BF1E1278-3114-4BD1-B589-30B5313C9502", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.4.0_beta2:*:*:*:*:*:*:*", matchCriteriaId: "32D216B0-31D6-4288-8773-FB2438944492", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "0A09E3F0-E1A6-4CC4-8134-89DF5DB6EA3B", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5:*:*:*:*:*:*:*", matchCriteriaId: "5B2C1156-93B6-4D71-8D9C-ED6FC6C0AE74", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5.0_beta1:*:*:*:*:*:*:*", matchCriteriaId: "11ACC1C9-A2C3-41CA-B608-C474B642A380", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5.0rc2:*:*:*:*:*:*:*", matchCriteriaId: "D8A021AB-A142-4DAD-9EB0-2352C625D8CC", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5.0rc3:*:*:*:*:*:*:*", matchCriteriaId: "9C0B173F-2161-4E40-A712-90DA6B997820", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "613A39A4-976E-4535-9408-533F957F7F87", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B5B657C6-A2DF-432A-9F46-1157C630CB20", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:2.4.0:*:*:*:*:*:*:*", matchCriteriaId: "9734B50E-BEA8-41DF-835F-7B15A9BB31E8", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:2.5.0:*:*:*:*:*:*:*", matchCriteriaId: "E9645D4F-BB03-49AD-AE79-6FE990BF18FE", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple cross-site request forgery (CSRF) vulnerabilities in FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, allow remote attackers to hijack the authentication of admins for requests that create a new admin account or have unspecified other impact.", }, { lang: "es", value: "Múltiples vulnerabilidades de falsificación de petición en sitios cruzados (CSRF) en FreePBX 2.5.1, y otros 2.4.x, 2.5.x, y versiones pre-lanzamiento 2.6.x, permiten a atacantes remotos secuestrar la autenticación de administradores en peticiones que crean una nueva cuenta de administrador o tener otros impactos no especificados.", }, ], id: "CVE-2009-1802", lastModified: "2024-11-21T01:03:24.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2009-05-28T14:30:00.377", references: [ { source: "cve@mitre.org", url: "http://freepbx.org/trac/ticket/3660", }, { source: "cve@mitre.org", url: "http://osvdb.org/54262", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/34772", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/34857", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://freepbx.org/trac/ticket/3660", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/54262", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/34772", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/34857", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-352", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-10-07 14:55
Modified
2024-11-21 02:16
Severity ?
Summary
htdocs_ari/includes/login.php in the ARI Framework module/Asterisk Recording Interface (ARI) in FreePBX before 2.9.0.9, 2.10.x, and 2.11 before 2.11.1.5 allows remote attackers to execute arbitrary code via the ari_auth cookie, related to the PHP unserialize function, as exploited in the wild in September 2014.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
freepbx | freepbx | 2.10.0.0 | |
freepbx | freepbx | 2.10.0.1 | |
freepbx | freepbx | 2.10.0.2 | |
freepbx | freepbx | 2.10.0.3 | |
freepbx | freepbx | 2.10.0.4 | |
freepbx | freepbx | 2.10.0.5 | |
freepbx | freepbx | 2.10.0.6 | |
freepbx | freepbx | 2.10.0.7 | |
freepbx | freepbx | 2.10.0.8 | |
freepbx | freepbx | 2.10.0.9 | |
freepbx | freepbx | 2.10.0.10 | |
freepbx | freepbx | 2.11.1.0 | |
freepbx | freepbx | 2.11.1.1 | |
freepbx | freepbx | 2.11.1.2 | |
freepbx | freepbx | 2.11.1.3 | |
freepbx | freepbx | 2.11.1.4 | |
sangoma | freepbx | * | |
sangoma | freepbx | 2.11.0.0 | |
sangoma | freepbx | 2.11.0.1 | |
sangoma | freepbx | 2.11.0.2 | |
sangoma | freepbx | 2.11.0.3 | |
sangoma | freepbx | 2.11.0.4 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:freepbx:freepbx:2.10.0.0:*:*:*:*:*:*:*", matchCriteriaId: "6317E737-4318-4986-AC41-9F69BEEE57C1", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.10.0.1:*:*:*:*:*:*:*", matchCriteriaId: "A5B24685-54DE-4F76-AC05-3CA32A63E34D", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.10.0.2:*:*:*:*:*:*:*", matchCriteriaId: "182B7950-427E-4F48-968D-125DC480F00F", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.10.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4126EAD1-F307-4252-B951-AF6BA8AB50AF", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.10.0.4:*:*:*:*:*:*:*", matchCriteriaId: "38BD066D-9777-4D58-B283-38C35BD97171", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.10.0.5:*:*:*:*:*:*:*", matchCriteriaId: "7035B567-4728-4E8C-B27C-5C37445C89C8", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.10.0.6:*:*:*:*:*:*:*", matchCriteriaId: "A591ECCE-6DBC-45BE-908F-BC5D8D817DDA", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.10.0.7:*:*:*:*:*:*:*", matchCriteriaId: "A284DA73-FD42-4C79-A4B7-3A1848F3883B", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.10.0.8:*:*:*:*:*:*:*", matchCriteriaId: "F04952AA-A9F1-4C2F-A19A-5DF5D4CB27AD", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.10.0.9:*:*:*:*:*:*:*", matchCriteriaId: "CA512E0C-5E77-4D67-8E49-D6F5B7DCE87F", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.10.0.10:*:*:*:*:*:*:*", matchCriteriaId: "9F29B0F2-C3A3-401C-A8D1-842E1D660BCF", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.11.1.0:*:*:*:*:*:*:*", matchCriteriaId: "61D4517F-EDED-49C3-B0E7-72703D49D78E", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.11.1.1:*:*:*:*:*:*:*", matchCriteriaId: "787A42CA-870B-4595-8234-93C6E3D68A51", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.11.1.2:*:*:*:*:*:*:*", matchCriteriaId: "697C8EA2-5E93-46A8-B604-49DDCEA8B0D9", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.11.1.3:*:*:*:*:*:*:*", matchCriteriaId: "A082A340-769A-4925-AA29-4334B4940F10", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.11.1.4:*:*:*:*:*:*:*", matchCriteriaId: "04B6860F-F3D1-42E4-908D-789E26F00640", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:*:*:*:*:*:*:*:*", matchCriteriaId: "575E3DA5-B8DE-47CC-A322-50EE531A5365", versionEndIncluding: "2.9.0.8", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:2.11.0.0:*:*:*:*:*:*:*", matchCriteriaId: "90B28D54-5FBD-403C-BA01-3D2CF2F8D8FB", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:2.11.0.1:*:*:*:*:*:*:*", matchCriteriaId: "37704860-CB88-4182-9928-35A2CCDDA0D0", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:2.11.0.2:*:*:*:*:*:*:*", matchCriteriaId: "30DB72FB-2D60-4C78-B2E3-A54857FA382E", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:2.11.0.3:*:*:*:*:*:*:*", matchCriteriaId: "A36B78CA-1130-4045-99C3-339132F4ED66", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:2.11.0.4:*:*:*:*:*:*:*", matchCriteriaId: "0675B567-E2FB-4870-BD42-5CB97DA1B9E9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "htdocs_ari/includes/login.php in the ARI Framework module/Asterisk Recording Interface (ARI) in FreePBX before 2.9.0.9, 2.10.x, and 2.11 before 2.11.1.5 allows remote attackers to execute arbitrary code via the ari_auth cookie, related to the PHP unserialize function, as exploited in the wild in September 2014.", }, { lang: "es", value: "En el archivo htdocs_ari/includes/login.php en el módulo del Framework ARI/Asterisk Recording Interface (ARI) en FreePBX anterior a versión 2.9.0.9, versiones 2.10.x y versiones 2.11 anteriores a 2.11.1.5, permite a los atacantes remotos ejecutar código arbitrario por medio de la cookie ari_auth, relacionada con la función unserialize de PHP, como se explotó “in the wild” en septiembre de 2014.", }, ], id: "CVE-2014-7235", lastModified: "2024-11-21T02:16:34.997", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-10-07T14:55:09.093", references: [ { source: "cve@mitre.org", url: "http://community.freepbx.org/t/critical-freepbx-rce-vulnerability-all-versions-cve-2014-7235/24536", }, { source: "cve@mitre.org", url: "http://packetstormsecurity.com/files/128516/FreePBX-Authentication-Bypass-Account-Creation.html", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61601", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/70188", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/96790", }, { source: "cve@mitre.org", url: "https://github.com/FreePBX/fw_ari/commit/f294b4580ce725ca3c5e692d86e63d40cef4d836", }, { source: "cve@mitre.org", url: "https://www.exploit-db.com/exploits/41005/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://community.freepbx.org/t/critical-freepbx-rce-vulnerability-all-versions-cve-2014-7235/24536", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://packetstormsecurity.com/files/128516/FreePBX-Authentication-Bypass-Account-Creation.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61601", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/70188", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/96790", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/FreePBX/fw_ari/commit/f294b4580ce725ca3c5e692d86e63d40cef4d836", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.exploit-db.com/exploits/41005/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-94", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2007-04-24 17:19
Modified
2024-11-21 00:30
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in freePBX 2.2.x allow remote attackers to inject arbitrary web script or HTML via the (1) From, (2) To, (3) Call-ID, (4) User-Agent, and unspecified other SIP protocol fields, which are stored in /var/log/asterisk/full and displayed by admin/modules/logfiles/asterisk-full-log.php.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:bsd:bsd:*:*:*:*:*:*:*:*", matchCriteriaId: "B44D379F-F380-42EC-9C9A-A4C8314A4BDF", vulnerable: false, }, { criteria: "cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*", matchCriteriaId: "61A4F116-1FEE-450E-99AE-6AD9ACDDE570", vulnerable: false, }, { criteria: "cpe:2.3:o:hp:tru64:*:*:*:*:*:*:*:*", matchCriteriaId: "1FE64F3F-48F6-493F-A81E-2B106FF73AC1", vulnerable: false, }, { criteria: "cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*", matchCriteriaId: "F7F01A55-7C37-4BAF-A4D4-61E8AC54FF79", vulnerable: false, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "155AD4FB-E527-4103-BCEF-801B653DEA37", vulnerable: false, }, { criteria: "cpe:2.3:o:santa_cruz_operation:sco_unix:*:*:*:*:*:*:*:*", matchCriteriaId: "ECCBDA43-9C75-4B36-8C90-EF26B8CD777D", vulnerable: false, }, { criteria: "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*", matchCriteriaId: "469B74F2-4B89-42B8-8638-731E92D463B9", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:freepbx:freepbx:2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "A896A046-4843-46B6-A8BA-1E8207AC2915", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.2_rc1:*:*:*:*:*:*:*", matchCriteriaId: "D2B7FDB0-1CB9-49B6-B260-3BE25D7973EC", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple cross-site scripting (XSS) vulnerabilities in freePBX 2.2.x allow remote attackers to inject arbitrary web script or HTML via the (1) From, (2) To, (3) Call-ID, (4) User-Agent, and unspecified other SIP protocol fields, which are stored in /var/log/asterisk/full and displayed by admin/modules/logfiles/asterisk-full-log.php.", }, { lang: "es", value: "Múltiples vulnerabilidades de secuencia de comandos en sitios cruzados (XSS) en freePBX 2.2.x permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de los campos (1) From, (2) To, (3) Call-ID, (4) User-Agent, y otros no especificados del protocolo SIP, lo cuales son almacenados en /var/log/asterisk/full y mostrados por admin/modules/logfiles/asterisk-full-log.php.", }, ], id: "CVE-2007-2191", lastModified: "2024-11-21T00:30:08.957", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: true, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2007-04-24T17:19:00.000", references: [ { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053882.html", }, { source: "cve@mitre.org", url: "http://osvdb.org/35315", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/24935", }, { source: "cve@mitre.org", url: "http://securityreason.com/securityalert/2627", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/23575", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2007/1535", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33772", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053882.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/35315", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24935", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securityreason.com/securityalert/2627", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/23575", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2007/1535", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33772", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2007-04-30 22:19
Modified
2024-11-21 00:30
Severity ?
Summary
admin/config.php in the music-on-hold module in freePBX 2.2.x allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the del parameter.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:freepbx:freepbx:*:*:*:*:*:*:*:*", matchCriteriaId: "F5408AA7-7838-4167-A8D3-295FC71B6189", versionEndIncluding: "2.2.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "admin/config.php in the music-on-hold module in freePBX 2.2.x allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the del parameter.", }, { lang: "es", value: "admin/config.php en el módulo music-on-hold de freePBX 2.2.x permite a administradores remotos autenticados ejecutar comandos de su elección mediante meta-caracteres de consola de comandos en el parámetro del.", }, ], id: "CVE-2007-2350", lastModified: "2024-11-21T00:30:34.297", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: true, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2007-04-30T22:19:00.000", references: [ { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053915.html", }, { source: "cve@mitre.org", url: "http://osvdb.org/35316", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/24935", }, { source: "cve@mitre.org", url: "http://securityreason.com/securityalert/2652", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2007/1535", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053915.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/35316", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/24935", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securityreason.com/securityalert/2652", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2007/1535", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2009-05-28 14:30
Modified
2024-11-21 01:03
Severity ?
Summary
FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, generates different error messages for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
freepbx | freepbx | 2.4 | |
freepbx | freepbx | 2.4.0_beta1 | |
freepbx | freepbx | 2.4.0_beta2 | |
freepbx | freepbx | 2.4.1 | |
freepbx | freepbx | 2.5 | |
freepbx | freepbx | 2.5.0_beta1 | |
freepbx | freepbx | 2.5.0rc2 | |
freepbx | freepbx | 2.5.0rc3 | |
freepbx | freepbx | 2.5.1 | |
freepbx | freepbx | 2.5.2 | |
sangoma | freepbx | 2.4.0 | |
sangoma | freepbx | 2.5.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:freepbx:freepbx:2.4:*:*:*:*:*:*:*", matchCriteriaId: "455E97D6-B069-49D6-B510-3D4112A9E1B3", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.4.0_beta1:*:*:*:*:*:*:*", matchCriteriaId: "BF1E1278-3114-4BD1-B589-30B5313C9502", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.4.0_beta2:*:*:*:*:*:*:*", matchCriteriaId: "32D216B0-31D6-4288-8773-FB2438944492", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "0A09E3F0-E1A6-4CC4-8134-89DF5DB6EA3B", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5:*:*:*:*:*:*:*", matchCriteriaId: "5B2C1156-93B6-4D71-8D9C-ED6FC6C0AE74", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5.0_beta1:*:*:*:*:*:*:*", matchCriteriaId: "11ACC1C9-A2C3-41CA-B608-C474B642A380", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5.0rc2:*:*:*:*:*:*:*", matchCriteriaId: "D8A021AB-A142-4DAD-9EB0-2352C625D8CC", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5.0rc3:*:*:*:*:*:*:*", matchCriteriaId: "9C0B173F-2161-4E40-A712-90DA6B997820", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "613A39A4-976E-4535-9408-533F957F7F87", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "B5B657C6-A2DF-432A-9F46-1157C630CB20", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:2.4.0:*:*:*:*:*:*:*", matchCriteriaId: "9734B50E-BEA8-41DF-835F-7B15A9BB31E8", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:2.5.0:*:*:*:*:*:*:*", matchCriteriaId: "E9645D4F-BB03-49AD-AE79-6FE990BF18FE", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, generates different error messages for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.", }, { lang: "es", value: "FreePBX v2.5.1, v2.4.x, v2.5.x, y pre-release v2.6.x, genera distintos errores tras intentos de login fallidos dependiendo de si la cuenta de usuario existe o no, lo que permite a atacantes remotos listar nombres de usuarios váalidos.", }, ], id: "CVE-2009-1803", lastModified: "2024-11-21T01:03:24.990", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2009-05-28T14:30:00.390", references: [ { source: "cve@mitre.org", url: "http://freepbx.org/trac/ticket/3660", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/34772", }, { source: "cve@mitre.org", url: "http://www.osvdb.org/54263", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/34857", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://freepbx.org/trac/ticket/3660", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/34772", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.osvdb.org/54263", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/34857", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-02-18 11:55
Modified
2024-11-21 02:05
Severity ?
Summary
admin/libraries/view.functions.php in FreePBX 2.9 before 2.9.0.14, 2.10 before 2.10.1.15, 2.11 before 2.11.0.23, and 12 before 12.0.1alpha22 does not restrict the set of functions accessible to the API handler, which allows remote attackers to execute arbitrary PHP code via the function and args parameters to admin/config.php.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:freepbx:freepbx:2.10:*:*:*:*:*:*:*", matchCriteriaId: "2A91F7BB-328B-446A-82F5-006372BB6A55", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.11:*:*:*:*:*:*:*", matchCriteriaId: "218DEE69-9011-4F41-8652-9546A575A066", vulnerable: true, }, { criteria: "cpe:2.3:a:freepbx:freepbx:2.12:*:*:*:*:*:*:*", matchCriteriaId: "2074522D-B309-488E-8FF3-CB04FC862306", vulnerable: true, }, { criteria: "cpe:2.3:a:sangoma:freepbx:2.9:*:*:*:*:*:*:*", matchCriteriaId: "04919406-CF00-4CEA-8D63-B2F13C93C05F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "admin/libraries/view.functions.php in FreePBX 2.9 before 2.9.0.14, 2.10 before 2.10.1.15, 2.11 before 2.11.0.23, and 12 before 12.0.1alpha22 does not restrict the set of functions accessible to the API handler, which allows remote attackers to execute arbitrary PHP code via the function and args parameters to admin/config.php.", }, { lang: "es", value: "admin/libraries/view.functions.php en FreePBX 2.9 anterior a 2.9.0.14, 2.10 anterior a 2.10.1.15, 2.11 anterior a 2.11.0.23 y 12 anterior a 12.0.1alpha22 no restringe el conjunto de funciones accesibles al manejador de la API, lo que permite a atacantes remotos ejecutar código PHP arbitrario a través de los parámetros function y args hacia admin/config.php.", }, ], id: "CVE-2014-1903", lastModified: "2024-11-21T02:05:14.757", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-02-18T11:55:16.977", references: [ { source: "cve@mitre.org", url: "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0097.html", }, { source: "cve@mitre.org", url: "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0111.html", }, { source: "cve@mitre.org", url: "http://code.freepbx.org/changelog/FreePBX_Framework?cs=a29382efeb293ef4f42aa9b841dfc8eabb2d1e03", }, { source: "cve@mitre.org", url: "http://code.freepbx.org/changelog/FreePBX_SVN?cs=16429", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://issues.freepbx.org/browse/FREEPBX-7117", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://issues.freepbx.org/browse/FREEPBX-7123", }, { source: "cve@mitre.org", url: "http://osvdb.org/103240", }, { source: "cve@mitre.org", url: "http://packetstormsecurity.com/files/125166/FreePBX-2.x-Code-Execution.html", }, { source: "cve@mitre.org", url: "http://packetstormsecurity.com/files/125215/FreePBX-2.9-Remote-Code-Execution.html", }, { source: "cve@mitre.org", url: "http://www.freepbx.org/news/2014-02-06/security-vulnerability-notice", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/531040/100/0/threaded", }, { source: "cve@mitre.org", url: "https://github.com/0x00string/oldays/blob/master/CVE-2014-1903.pl", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0097.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0111.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://code.freepbx.org/changelog/FreePBX_Framework?cs=a29382efeb293ef4f42aa9b841dfc8eabb2d1e03", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://code.freepbx.org/changelog/FreePBX_SVN?cs=16429", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://issues.freepbx.org/browse/FREEPBX-7117", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://issues.freepbx.org/browse/FREEPBX-7123", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/103240", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://packetstormsecurity.com/files/125166/FreePBX-2.x-Code-Execution.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://packetstormsecurity.com/files/125215/FreePBX-2.9-Remote-Code-Execution.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.freepbx.org/news/2014-02-06/security-vulnerability-notice", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/531040/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/0x00string/oldays/blob/master/CVE-2014-1903.pl", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-264", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }