trixbox 2.8.0.4 has OS command injection via shell metacharacters in the lang parameter to /maint/modules/home/index.php.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/162854/Trixbox-2.8.0.4-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/103004 | Third Party Advisory VDB Entry |
https://github.com/Hacker5preme/Exploits/tree/main/CVE-2017-14535-Exploit | Exploit Third Party Advisory |
https://secur1tyadvisory.wordpress.com/2018/02/11/trixbox-os-command-injection-vulnerability-cve-2017-14535/ | Exploit Third Party Advisory |
https://twitter.com/tiger_tigerboy/status/962689803270500352 | Third Party Advisory |
https://www.linkedin.com/pulse/trixbox-os-command-injection-vulnerability-sachin-wagh-ceh-ecsa-/?published=t | Exploit Third Party Advisory |
Configurations
History
19 Feb 2022, 04:29
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Jun 2021, 17:30
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/162854/Trixbox-2.8.0.4-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry |
28 May 2021, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2018-02-16 04:29
Updated : 2024-02-04 19:46
NVD link : CVE-2017-14535
Mitre link : CVE-2017-14535
CVE.ORG link : CVE-2017-14535
JSON object : View
Products Affected
netfortris
- trixbox
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')