Page 4 of 24 results (0.005 seconds)

CVSS: 6.5EPSS: 87%CPEs: 1EXPL: 3

Directory traversal vulnerability in page.recordings.php in the System Recordings component in the configuration interface in FreePBX 2.8.0 and earlier allows remote authenticated administrators to create arbitrary files via a .. (dot dot) in the usersnum parameter to admin/config.php, as demonstrated by creating a .php file under the web root. Multiples vulnerabilidades de salto de directorio en page.recordings.php en el componente System Recordings en la interface de cofiguración en interfaz en FreePBX v2.8.0 y anteriores permite a administradores autenticados remotamente crear ficheros a su elección a través de .. (punto punto) en el parámetro usersnum en dmin/config.php, como quedó demostrado en la creacción de un fichero .php bajo la raíz web. FreePBX versions 2.8.0 and below suffer from a remote code execution vulnerability. • https://www.exploit-db.com/exploits/15098 https://github.com/moayadalmalat/CVE-2010-3490 http://www.exploit-db.com/exploits/15098 http://www.freepbx.org/trac/ticket/4553 http://www.securityfocus.com/archive/1/513947/100/0/threaded http://www.securityfocus.com/bid/43454 https://www.trustwave.com/spiderlabs/advisories/TWSL2010-005.txt • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.3EPSS: 7%CPEs: 2EXPL: 5

Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.5.2 and 2.6.0rc2, and possibly other versions, allow remote attackers to inject arbitrary web script or HTML via the (1) tech parameter to admin/admin/config.php during a trunks display action, the (2) description parameter during an Add Zap Channel action, and (3) unspecified vectors during an Add Recordings action. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en FreePBX v2.5.2 y v2.6.0rc2, y probablemente otras versiones, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante (1) el parámetro "tech" en admin/admin/config.php durante una acción trunks display, (2) el parámetro "description" durante una acción Add Zap Channel, y (3) vectores no especificados durante una acción Add Recordings. • https://www.exploit-db.com/exploits/33442 https://www.exploit-db.com/exploits/33443 https://www.exploit-db.com/exploits/10645 http://osvdb.org/61357 http://osvdb.org/61358 http://secunia.com/advisories/37972 http://www.exploit-db.com/exploits/10645 http://www.securityfocus.com/bid/37482 https://exchange.xforce.ibmcloud.com/vulnerabilities/55053 https://exchange.xforce.ibmcloud.com/vulnerabilities/55054 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 11EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, allow remote attackers to inject arbitrary web script or HTML via the (1) display parameter to reports.php, the (2) order and (3) extdisplay parameters to config.php, and the (4) sort parameter to recordings/index.php. NOTE: some of these details are obtained from third party information. Múltiples vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados(XSS) en FreePBX v2.5.1, y otras v2.4.x, v2.5.x, y versiones pre-release v2.6.x, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través (1) del parámetro display a reports.php, (2) el order y (3) el parámetro extdisplay a config.php, y (4) el parámetro sort a recordings/index.php. NOTA: algunos de estos detalles han sido obtenidos a partir de terceros. • http://freepbx.org/trac/ticket/3660 http://osvdb.org/54259 http://osvdb.org/54260 http://osvdb.org/54261 http://secunia.com/advisories/34772 http://www.securityfocus.com/bid/34857 https://exchange.xforce.ibmcloud.com/vulnerabilities/50361 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 0%CPEs: 12EXPL: 0

Multiple cross-site request forgery (CSRF) vulnerabilities in FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, allow remote attackers to hijack the authentication of admins for requests that create a new admin account or have unspecified other impact. Múltiples vulnerabilidades de falsificación de petición en sitios cruzados (CSRF) en FreePBX 2.5.1, y otros 2.4.x, 2.5.x, y versiones pre-lanzamiento 2.6.x, permiten a atacantes remotos secuestrar la autenticación de administradores en peticiones que crean una nueva cuenta de administrador o tener otros impactos no especificados. • http://freepbx.org/trac/ticket/3660 http://osvdb.org/54262 http://secunia.com/advisories/34772 http://www.securityfocus.com/bid/34857 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.0EPSS: 0%CPEs: 12EXPL: 0

FreePBX 2.5.1, and other 2.4.x, 2.5.x, and pre-release 2.6.x versions, generates different error messages for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. FreePBX v2.5.1, v2.4.x, v2.5.x, y pre-release v2.6.x, genera distintos errores tras intentos de login fallidos dependiendo de si la cuenta de usuario existe o no, lo que permite a atacantes remotos listar nombres de usuarios váalidos. • http://freepbx.org/trac/ticket/3660 http://secunia.com/advisories/34772 http://www.osvdb.org/54263 http://www.securityfocus.com/bid/34857 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •