An OS Command Injection vulnerability in the endpoint_devicemap.php component of Fonality Trixbox Community Edition allows an attacker to execute commands on the underlying operating system as the "asterisk" user. Note that Trixbox Community Edition has been unsupported by the vendor since 2012. This issue affects: Fonality Trixbox Community Edition, versions 1.2.0 through 2.8.0.4. Versions 1.0 and 1.1 are unaffected.
References
Link | Resource |
---|---|
https://github.com/rapid7/metasploit-framework/pull/13353 | Exploit Issue Tracking Patch Third Party Advisory |
http://packetstormsecurity.com/files/157565/TrixBox-CE-2.8.0.4-Command-Execution.html | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-05-01 09:15
Updated : 2022-04-18 02:37
NVD link : CVE-2020-7351
Mitre link : CVE-2020-7351
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
netfortris
- trixbox