CVE-2018-5779

A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to copy a malicious script into a newly generated PHP file and then execute the generated file using specially crafted requests. Successful exploit could allow an attacker to execute arbitrary code within the context of the application.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mitel:connect_onsite:*:*:*:*:*:*:*:*
cpe:2.3:a:mitel:st14.2:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:09

Type Values Removed Values Added
References () https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-18-0004 - () https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-18-0004 -

Information

Published : 2018-03-14 16:29

Updated : 2024-11-21 04:09


NVD link : CVE-2018-5779

Mitre link : CVE-2018-5779

CVE.ORG link : CVE-2018-5779


JSON object : View

Products Affected

mitel

  • st14.2
  • connect_onsite
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')