trixbox 2.8.0.4 has OS command injection via shell metacharacters in the lang parameter to /maint/modules/home/index.php.
References
Link | Resource |
---|---|
https://www.linkedin.com/pulse/trixbox-os-command-injection-vulnerability-sachin-wagh-ceh-ecsa-/?published=t | Exploit Third Party Advisory |
https://twitter.com/tiger_tigerboy/status/962689803270500352 | Third Party Advisory |
https://secur1tyadvisory.wordpress.com/2018/02/11/trixbox-os-command-injection-vulnerability-cve-2017-14535/ | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/103004 | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/162854/Trixbox-2.8.0.4-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://github.com/Hacker5preme/Exploits/tree/main/CVE-2017-14535-Exploit | Exploit Third Party Advisory |
Configurations
Information
Published : 2018-02-15 20:29
Updated : 2022-02-18 20:29
NVD link : CVE-2017-14535
Mitre link : CVE-2017-14535
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
netfortris
- trixbox