Page 4 of 27 results (0.016 seconds)

CVSS: 7.5EPSS: 96%CPEs: 4EXPL: 2

admin/libraries/view.functions.php in FreePBX 2.9 before 2.9.0.14, 2.10 before 2.10.1.15, 2.11 before 2.11.0.23, and 12 before 12.0.1alpha22 does not restrict the set of functions accessible to the API handler, which allows remote attackers to execute arbitrary PHP code via the function and args parameters to admin/config.php. admin/libraries/view.functions.php en FreePBX 2.9 anterior a 2.9.0.14, 2.10 anterior a 2.10.1.15, 2.11 anterior a 2.11.0.23 y 12 anterior a 12.0.1alpha22 no restringe el conjunto de funciones accesibles al manejador de la API, lo que permite a atacantes remotos ejecutar código PHP arbitrario a través de los parámetros function y args hacia admin/config.php. • https://www.exploit-db.com/exploits/32214 https://www.exploit-db.com/exploits/32512 http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0097.html http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0111.html http://code.freepbx.org/changelog/FreePBX_Framework?cs=a29382efeb293ef4f42aa9b841dfc8eabb2d1e03 http://code.freepbx.org/changelog/FreePBX_SVN?cs=16429 http://issues.freepbx.org/browse/FREEPBX-7117 http://issues.freepbx.org/browse/FREEPBX-7123 http://osvdb.org/103240 http:/ • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 36%CPEs: 2EXPL: 7

The callme_startcall function in recordings/misc/callme_page.php in FreePBX 2.9, 2.10, and earlier allows remote attackers to execute arbitrary commands via the callmenum parameter in a c action. La función callme_startcall en recordings/misc/callme_page.php en FreePBX v2.9, v2.10 y anteriores permite a atacantes remotos ejecutar comandos arbitrarios a través del parámetro callmenum en acción alterna. • https://www.exploit-db.com/exploits/18659 https://www.exploit-db.com/exploits/18649 https://www.exploit-db.com/exploits/18650 https://github.com/0xConstant/CVE-2012-4869 http://packetstormsecurity.org/files/111028/FreePBX-2.10.0-Remote-Command-Execution-XSS.html http://seclists.org/fulldisclosure/2012/Mar/234 http://secunia.com/advisories/48463 http://www.exploit-db.com/exploits/18649 http://www.exploit-db.com/exploits/18659 http://www.freepbx.org/trac/ticket/5711 http • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 5

Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.9 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) context parameter to panel/index_amp.php or (2) panel/dhtml/index.php; (3) clid or (4) clidname parameters to panel/flash/mypage.php; (5) PATH_INFO to admin/views/freepbx_reload.php; or (6) login parameter to recordings/index.php. Múltiples vulnerabilidades de ejecución de comandos en sitios cruzados (XSS) en FreePBX v2.9 y anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro de contexto (1) al panel/index_amp.php o (2) Panel/dhtml/index.php, (3) CLID o (4) parámetros clidname al panel/flash/mypage.php, (5) PATH_INFO para admin/views/freepbx_reload.php, o (6) parámetro login/index.php a las grabaciones. • https://www.exploit-db.com/exploits/18649 http://packetstormsecurity.org/files/111028/FreePBX-2.10.0-Remote-Command-Execution-XSS.html http://seclists.org/fulldisclosure/2012/Mar/234 http://secunia.com/advisories/48463 http://secunia.com/advisories/48475 http://www.exploit-db.com/exploits/18649 http://www.freepbx.org/trac/ticket/5711 http://www.securityfocus.com/bid/52630 https://exchange.xforce.ibmcloud.com/vulnerabilities/74173 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 86%CPEs: 1EXPL: 3

Directory traversal vulnerability in page.recordings.php in the System Recordings component in the configuration interface in FreePBX 2.8.0 and earlier allows remote authenticated administrators to create arbitrary files via a .. (dot dot) in the usersnum parameter to admin/config.php, as demonstrated by creating a .php file under the web root. Multiples vulnerabilidades de salto de directorio en page.recordings.php en el componente System Recordings en la interface de cofiguración en interfaz en FreePBX v2.8.0 y anteriores permite a administradores autenticados remotamente crear ficheros a su elección a través de .. (punto punto) en el parámetro usersnum en dmin/config.php, como quedó demostrado en la creacción de un fichero .php bajo la raíz web. FreePBX versions 2.8.0 and below suffer from a remote code execution vulnerability. • https://www.exploit-db.com/exploits/15098 https://github.com/moayadalmalat/CVE-2010-3490 http://www.exploit-db.com/exploits/15098 http://www.freepbx.org/trac/ticket/4553 http://www.securityfocus.com/archive/1/513947/100/0/threaded http://www.securityfocus.com/bid/43454 https://www.trustwave.com/spiderlabs/advisories/TWSL2010-005.txt • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.3EPSS: 7%CPEs: 2EXPL: 5

Multiple cross-site scripting (XSS) vulnerabilities in FreePBX 2.5.2 and 2.6.0rc2, and possibly other versions, allow remote attackers to inject arbitrary web script or HTML via the (1) tech parameter to admin/admin/config.php during a trunks display action, the (2) description parameter during an Add Zap Channel action, and (3) unspecified vectors during an Add Recordings action. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en FreePBX v2.5.2 y v2.6.0rc2, y probablemente otras versiones, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante (1) el parámetro "tech" en admin/admin/config.php durante una acción trunks display, (2) el parámetro "description" durante una acción Add Zap Channel, y (3) vectores no especificados durante una acción Add Recordings. • https://www.exploit-db.com/exploits/33442 https://www.exploit-db.com/exploits/33443 https://www.exploit-db.com/exploits/10645 http://osvdb.org/61357 http://osvdb.org/61358 http://secunia.com/advisories/37972 http://www.exploit-db.com/exploits/10645 http://www.securityfocus.com/bid/37482 https://exchange.xforce.ibmcloud.com/vulnerabilities/55053 https://exchange.xforce.ibmcloud.com/vulnerabilities/55054 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •