The Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to Argument Injection via special characters in the username field. Upon successful exploitation, a remote unauthenticated user can create a local system user with sudo privileges, and use that user to login to the system (either via the web interface or via SSH) to achieve complete compromise of the device. This affects /var/webconfig/gui/Webconfig.inc.php and /usr/local/sng/bin/sng-user-mgmt.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/154914/Sangoma-SBC-2.3.23-119-GA-Unauthenticated-User-Creation.html | Exploit Third Party Advisory VDB Entry |
https://blog.appsecco.com | Not Applicable |
http://seclists.org/fulldisclosure/2019/Oct/40 | Exploit Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-10-22 09:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-12147
Mitre link : CVE-2019-12147
JSON object : View
CWE
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Products Affected
sangoma
- session_border_controller_firmware
- session_border_controller