XSS in app/operator_panel/index_inc.php in the Operator Panel module in FusionPBX 4.4.3 allows remote unauthenticated attackers to inject arbitrary JavaScript characters by placing a phone call using a specially crafted caller ID number. This can further lead to remote code execution by chaining this vulnerability with a command injection vulnerability also present in FusionPBX.
References
Link | Resource |
---|---|
https://blog.gdssecurity.com/labs/2019/6/7/rce-using-caller-id-multiple-vulnerabilities-in-fusionpbx.html | Exploit Third Party Advisory |
https://github.com/fusionpbx/fusionpbx/commit/391a23d070f3036d0c7760992f6970b0a76ee4d7 | Patch Third Party Advisory |
http://packetstormsecurity.com/files/153256/FusionPBX-4.4.3-Remote-Command-Execution.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2019-06-17 11:15
Updated : 2019-06-18 09:35
NVD link : CVE-2019-11408
Mitre link : CVE-2019-11408
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
fusionpbx
- fusionpbx