An OS Command Injection vulnerability in the endpoint_devicemap.php component of Fonality Trixbox Community Edition allows an attacker to execute commands on the underlying operating system as the "asterisk" user. Note that Trixbox Community Edition has been unsupported by the vendor since 2012. This issue affects: Fonality Trixbox Community Edition, versions 1.2.0 through 2.8.0.4. Versions 1.0 and 1.1 are unaffected.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/157565/TrixBox-CE-2.8.0.4-Command-Execution.html | Exploit Third Party Advisory |
https://github.com/rapid7/metasploit-framework/pull/13353 | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
18 Apr 2022, 09:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:netfortris:trixbox:*:*:*:*:community:*:*:* |
Information
Published : 2020-05-01 16:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-7351
Mitre link : CVE-2020-7351
CVE.ORG link : CVE-2020-7351
JSON object : View
Products Affected
netfortris
- trixbox
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')